Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (121)
  • Open Access

    ARTICLE

    Blockchain-Assisted Improved Cryptographic Privacy-Preserving FL Model with Consensus Algorithm for ORAN

    Raghavendra Kulkarni1, Venkata Satya Suresh kumar Kondeti1, Binu Sudhakaran Pillai2, Surendran Rajendran3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069835 - 10 November 2025

    Abstract The next-generation RAN, known as Open Radio Access Network (ORAN), allows for several advantages, including cost-effectiveness, network flexibility, and interoperability. Now ORAN applications, utilising machine learning (ML) and artificial intelligence (AI) techniques, have become standard practice. The need for Federated Learning (FL) for ML model training in ORAN environments is heightened by the modularised structure of the ORAN architecture and the shortcomings of conventional ML techniques. However, the traditional plaintext model update sharing of FL in multi-BS contexts is susceptible to privacy violations such as deep-leakage gradient assaults and inference. Therefore, this research presents a… More >

  • Open Access

    ARTICLE

    Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms

    Ehan Sohn1, Sangmyung Lee1, Sunggon Kim1, Kiwook Sohn1, Manish Kumar2, Yongseok Son3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2761-2785, 2025, DOI:10.32604/cmes.2025.070888 - 26 November 2025

    Abstract With the accelerated growth of the Internet of Things (IoT), real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local. Since these devices often handle personal information under limited resources, cryptographic algorithms must be executed efficiently. Their computational characteristics strongly affect system performance, making it necessary to analyze resource impact and predict usage under diverse configurations. In this paper, we analyze the phase-level resource usage of AES variants, ChaCha20, ECC, and RSA on an edge device and develop a prediction model. We apply these algorithms… More >

  • Open Access

    REVIEW

    On Privacy-Preserved Machine Learning Using Secure Multi-Party Computing: Techniques and Trends

    Oshan Mudannayake1,#, Amila Indika2,#, Upul Jayasinghe2, Gyu Myoung Lee3,*, Janaka Alawatugoda4

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 2527-2578, 2025, DOI:10.32604/cmc.2025.068875 - 23 September 2025

    Abstract The rapid adoption of machine learning in sensitive domains, such as healthcare, finance, and government services, has heightened the need for robust, privacy-preserving techniques. Traditional machine learning approaches lack built-in privacy mechanisms, exposing sensitive data to risks, which motivates the development of Privacy-Preserving Machine Learning (PPML) methods. Despite significant advances in PPML, a comprehensive and focused exploration of Secure Multi-Party Computing (SMPC) within this context remains underdeveloped. This review aims to bridge this knowledge gap by systematically analyzing the role of SMPC in PPML, offering a structured overview of current techniques, challenges, and future directions. More >

  • Open Access

    REVIEW

    Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission

    Michael Juma Ayuma1,*, Shem Mbandu Angolo1, Philemon Nthenge Kasyoka2, Simon Maina Karume3

    Journal of Cyber Security, Vol.7, pp. 307-341, 2025, DOI:10.32604/jcs.2025.067360 - 02 September 2025

    Abstract Token transmission is a fundamental component in diverse domains, including computer networks, blockchain systems, distributed architectures, financial transactions, secure communications, and identity verification. Ensuring optimal performance during transmission is essential for maintaining the efficiency of data in transit. However, persistent threats from adversarial actors continue to pose significant risks to the integrity, authenticity, and confidentiality of transmitted data. This study presents a comprehensive review of existing research on token transmission techniques, examining the roles of transmission channels, emerging trends, and the associated security and performance implications. A critical analysis is conducted to assess the strengths, More >

  • Open Access

    ARTICLE

    Dynamic Session Key Allocation with Time-Indexed Ascon for Low-Latency Cloud-Edge-End Communication

    Fang-Yie Leu1, Kun-Lin Tsai2,*, Li-Woei Chen3, Deng-Yao Yao2, Jian-Fu Tsai2, Ju-Wei Zhu2, Guo-Wei Wang2

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1937-1957, 2025, DOI:10.32604/cmc.2025.068486 - 29 August 2025

    Abstract With the rapid development of Cloud-Edge-End (CEE) computing, the demand for secure and lightweight communication protocols is increasingly critical, particularly for latency-sensitive applications such as smart manufacturing, healthcare, and real-time monitoring. While traditional cryptographic schemes offer robust protection, they often impose excessive computational and energy overhead, rendering them unsuitable for use in resource-constrained edge and end devices. To address these challenges, in this paper, we propose a novel lightweight encryption framework, namely Dynamic Session Key Allocation with Time-Indexed Ascon (DSKA-TIA). Built upon the NIST-endorsed Ascon algorithm, the DSKA-TIA introduces a time-indexed session key generation mechanism… More >

  • Open Access

    ARTICLE

    Sine-Polynomial Chaotic Map (SPCM): A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks

    David S. Bhatti1,*, Annas W. Malik2, Haeung Choi1, Ki-Il Kim3,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2157-2177, 2025, DOI:10.32604/cmc.2025.068360 - 29 August 2025

    Abstract Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies, limiting their use for lightweight, secure image encryption in resource-constrained Wireless Sensor Networks (WSNs). We propose the SPCM, a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions, leveraging a piecewise function to achieve a broad chaotic range () and a high Lyapunov exponent (5.04). Validated through nine benchmarks, including standard randomness tests, Diehard tests, and Shannon entropy (3.883), SPCM demonstrates superior randomness and high sensitivity to initial conditions. Applied to image encryption, SPCM achieves 0.152582 s (39% faster than some techniques) and 433.42 More >

  • Open Access

    ARTICLE

    Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi

    Ahmed I. Alutaibi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 875-903, 2025, DOI:10.32604/cmc.2025.067078 - 29 August 2025

    Abstract The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes, particularly in Decentralized Finance (DeFi) systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification. This paper proposes a quantum-resilient, blockchain-based identity verification framework designed to address critical challenges in privacy preservation, scalability, and post-quantum security. The proposed model integrates Post-quantum Cryptography (PQC), specifically lattice-based cryptographic primitives, with Decentralized Identifiers (DIDs) and Zero-knowledge Proofs (ZKPs) to ensure verifiability, anonymity, and resistance to quantum attacks. A dual-layer architecture is introduced, comprising an identity layer for credential generation and validation,… More >

  • Open Access

    ARTICLE

    EdgeGuard-IoT: 6G-Enabled Edge Intelligence for Secure Federated Learning and Adaptive Anomaly Detection in Industry 5.0

    Mohammed Naif Alatawi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 695-727, 2025, DOI:10.32604/cmc.2025.066606 - 29 August 2025

    Abstract Adaptive robust secure framework plays a vital role in implementing intelligent automation and decentralized decision making of Industry 5.0. Latency, privacy risks and the complexity of industrial networks have been preventing attempts at traditional cloud-based learning systems. We demonstrate that, to overcome these challenges, for instance, the EdgeGuard-IoT framework, a 6G edge intelligence framework enhancing cybersecurity and operational resilience of the smart grid, is needed on the edge to integrate Secure Federated Learning (SFL) and Adaptive Anomaly Detection (AAD). With ultra-reliable low latency communication (URLLC) of 6G, artificial intelligence-based network orchestration, and massive machine type… More >

  • Open Access

    REVIEW

    A Survey on Token Transmission Attacks, Effects, and Mitigation Strategies in IoT Devices

    Michael Juma Ayuma1, Shem Mbandu Angolo1,*, Philemon Nthenge Kasyoka2,*

    Journal on Artificial Intelligence, Vol.7, pp. 205-254, 2025, DOI:10.32604/jai.2025.067361 - 19 August 2025

    Abstract The exponential growth of Internet of Things (IoT) devices has introduced significant security challenges, particularly in securing token-based communication protocols used for authentication and authorization. This survey systematically reviews the vulnerabilities in token transmission within IoT environments, focusing on various sophisticated attack vectors such as replay attacks, token hijacking, man-in-the-middle (MITM) attacks, token injection, and eavesdropping among others. These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth, JSON Web Tokens (JWT), and bearer tokens, which are widely used in IoT ecosystems for managing device interactions and access control. The impact of such attacks… More >

  • Open Access

    ARTICLE

    IECC-SAIN: Innovative ECC-Based Approach for Secure Authentication in IoT Networks

    Younes Lahraoui1, Jihane Jebrane2, Youssef Amal1, Saiida Lazaar1, Cheng-Chi Lee3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.1, pp. 615-641, 2025, DOI:10.32604/cmes.2025.067778 - 31 July 2025

    Abstract Due to their resource constraints, Internet of Things (IoT) devices require authentication mechanisms that are both secure and efficient. Elliptic curve cryptography (ECC) meets these needs by providing strong security with shorter key lengths, which significantly reduces the computational overhead required for authentication algorithms. This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields. By reducing reliance on costly point multiplication, the proposed algorithm significantly improves execution time, storage requirements, and communication cost across varying security levels. The proposed authentication… More >

Displaying 1-10 on page 1 of 121. Per Page