Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (397)
  • Open Access

    ARTICLE

    Smart Contract Vulnerability Detection Using Large Language Models and Graph Structural Analysis

    Ra-Yeon Choi1, Yeji Song2, Minsoo Jang1, Taekyung Kim3, Jinhyun Ahn4,*, Dong-Hyuk Im5,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 785-801, 2025, DOI:10.32604/cmc.2025.061185 - 26 March 2025

    Abstract Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity. However, their immutability after deployment makes programming errors particularly critical, as such errors can be exploited to compromise blockchain security. Existing vulnerability detection methods often rely on fixed rules or target specific vulnerabilities, limiting their scalability and adaptability to diverse smart contract scenarios. Furthermore, natural language processing approaches for source code analysis frequently fail to capture program flow, which is essential for identifying structural vulnerabilities. To address these limitations, we propose a novel model that integrates textual and structural… More >

  • Open Access

    ARTICLE

    Blockchain-Based Trust Model for Inter-Domain Routing

    Qiong Yang1, Li Ma1,2,*, Sami Ullah3, Shanshan Tu1, Hisham Alasmary4, Muhammad Waqas5,6

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4821-4839, 2025, DOI:10.32604/cmc.2025.059497 - 06 March 2025

    Abstract Border Gateway Protocol (BGP), as the standard inter-domain routing protocol, is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems (AS). BGP nodes, communicating in a distributed dynamic environment, face several security challenges, with trust being one of the most important issues in inter-domain routing. Existing research, which performs trust evaluation when exchanging routing information to suppress malicious routing behavior, cannot meet the scalability requirements of BGP nodes. In this paper, we propose a blockchain-based trust model for inter-domain routing. Our model achieves scalability by allowing the master node of… More >

  • Open Access

    ARTICLE

    A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE

    Hongliang Tian, Zuoqing Li*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3983-4002, 2025, DOI:10.32604/cmc.2025.059103 - 06 March 2025

    Abstract Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes. To address these issues, a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption (FHE) is proposed. In the proposed scheme, the functional relationship is established by Box-Muller, Discrete Gaussian Distribution Function (DGDF) and Uniform Random Distribution Function (URDF) are used to improve the security and efficiency of key generation. Subsequently, the data preprocessing function is introduced to perform cleaning, deduplication, and normalization operations on the transaction data of multi-key signature, and it is classified into… More >

  • Open Access

    ARTICLE

    LSBSP: A Lightweight Sharding Method of Blockchain Based on State Pruning for Efficient Data Sharing in IoMT

    Guoqiong Liao1,3, Yinxiang Lei1,2,*, Yufang Xie1, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3309-3335, 2025, DOI:10.32604/cmc.2024.060077 - 17 February 2025

    Abstract As the Internet of Medical Things (IoMT) continues to expand, smart health-monitoring devices generate vast amounts of valuable data while simultaneously raising critical security and privacy challenges. Blockchain technology presents a promising avenue to address these concerns due to its inherent decentralization and security features. However, scalability remains a persistent hurdle, particularly for IoMT applications that involve large-scale networks and resource-constrained devices. This paper introduces a novel lightweight sharding method tailored to the unique demands of IoMT data sharing. Our approach enhances state bootstrapping efficiency and reduces operational overhead by utilizing a dual-chain structure comprising… More >

  • Open Access

    ARTICLE

    A Trusted Distributed Oracle Scheme Based on Share Recovery Threshold Signature

    Shihao Wang1, Xuehui Du1,*, Xiangyu Wu1, Qiantao Yang1,2, Wenjuan Wang1, Yu Cao1, Aodi Liu1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3355-3379, 2025, DOI:10.32604/cmc.2024.059722 - 17 February 2025

    Abstract With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put… More >

  • Open Access

    ARTICLE

    An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things

    Gang Xu1,2,6, Xinyu Fan1, Xiu-Bo Chen2, Xin Liu4, Zongpeng Li5, Yanhui Mao6,7, Kejia Zhang3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2293-2309, 2025, DOI:10.32604/cmc.2024.057882 - 17 February 2025

    Abstract Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure,… More >

  • Open Access

    ARTICLE

    Combined Architecture of Destination Sequence Distance Vector (DSDV) Routing with Software Defined Networking (SDN) and Blockchain in Cyber-Physical Systems

    Jawad Ahmad Ansari1, Mohamad Khairi Ishak2,*, Khalid Ammar2

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2311-2330, 2025, DOI:10.32604/cmc.2025.057848 - 17 February 2025

    Abstract Cyber-Physical System (CPS) devices are increasing exponentially. Lacking confidentiality creates a vulnerable network. Thus, demanding the overall system with the latest and robust solutions for the defence mechanisms with low computation cost, increased integrity, and surveillance. The proposal of a mechanism that utilizes the features of authenticity measures using the Destination Sequence Distance Vector (DSDV) routing protocol which applies to the multi-WSN (Wireless Sensor Network) of IoT devices in CPS which is developed for the Device-to-Device (D2D) authentication developed from the local-chain and public chain respectively combined with the Software Defined Networking (SDN) control and… More >

  • Open Access

    ARTICLE

    Detecting Ethereum Ponzi Scheme Based on Hybrid Sampling for Smart Contract

    Yuanjun Qu, Xiameng Si*, Haiyan Kang, Hanlin Zhou

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3111-3130, 2025, DOI:10.32604/cmc.2024.057368 - 17 February 2025

    Abstract With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Management System for Enhanced Patient Privacy and Secure Telehealth and Telemedicine Data

    Ayoub Ghani1,*, Ahmed Zinedine1, Mohammed El Mohajir2

    Intelligent Automation & Soft Computing, Vol.40, pp. 75-98, 2025, DOI:10.32604/iasc.2025.060143 - 23 January 2025

    Abstract The Internet of Things (IoT) advances allow healthcare providers to distantly gather and immediately analyze patient health data for diagnostic purposes via connected health devices. In a COVID-19-like pandemic, connected devices can mitigate virus spread and make essential information, such as respiratory patterns, available to healthcare professionals. However, these devices generate vast amounts of data, rendering them susceptible to privacy breaches, and data leaks. Blockchain technology is a robust solution to address these issues in telemedicine systems. This paper proposes a blockchain-based access management solution to enhance patient privacy and secure telehealth and telemedicine data.… More >

  • Open Access

    ARTICLE

    Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model

    Hoon Ko1, Marek R. Ogiela2,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 259-278, 2025, DOI:10.32604/cmc.2024.057257 - 03 January 2025

    Abstract This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology. By combining the strengths of blockchain and generative AI, the research team aimed to address the timely challenge of safeguarding visual medical content. The participating researchers conducted a comprehensive analysis, examining the vulnerabilities of medical AI services, personal information protection issues, and overall security weaknesses. This multifaceted exploration led to an in-depth evaluation of the model’s performance and security. Notably, the correlation between accuracy, detection rate, and error rate was… More >

Displaying 51-60 on page 6 of 397. Per Page