Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (95)
  • Open Access

    ARTICLE

    A Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption

    Yongsheng Hu*, Liyong Nan

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6555-6571, 2023, DOI:10.32604/cmc.2023.036090

    Abstract The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem. The classical chaotic map has simple dynamic behavior and few control parameters, so it is not suitable for modern cryptography. In this paper, we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map (2D-SSCDB). The 2D-SSCDB has a simple structure but has complex dynamic behavior. The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior, and the parameter space in the hyperchaotic state is extensive and continuous. Trajectory analysis and some randomness tests verify that… More >

  • Open Access

    ARTICLE

    EsECC_SDN: Attack Detection and Classification Model for MANET

    Veera Ankalu Vuyyuru1, Youseef Alotaibi2, Neenavath Veeraiah3,*, Saleh Alghamdi4, Korimilli Sirisha5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6665-6688, 2023, DOI:10.32604/cmc.2023.032140

    Abstract Mobile Ad Hoc Networks (MANET) is the framework for social networking with a realistic framework. In the MANET environment, based on the query, information is transmitted between the sender and receiver. In the MANET network, the nodes within the communication range are involved in data transmission. Even the nodes that lie outside of the communication range are involved in the transmission of relay messages. However, due to the openness and frequent mobility of nodes, they are subjected to the vast range of security threats in MANET. Hence, it is necessary to develop an appropriate security mechanism for the data MANET… More >

  • Open Access

    ARTICLE

    Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics

    S. Aanjanadevi1,*, S. Aanjankumar2, K. R. Ramela3, V. Palanisamy4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2351-2362, 2023, DOI:10.32604/csse.2023.031893

    Abstract Due to the enormous usage of the internet for transmission of data over a network, security and authenticity become major risks. Major challenges encountered in biometric system are the misuse of enrolled biometric templates stored in database server. To describe these issues various algorithms are implemented to deliver better protection to biometric traits such as physical (Face, fingerprint, Ear etc.) and behavioural (Gesture, Voice, tying etc.) by means of matching and verification process. In this work, biometric security system with fuzzy extractor and convolutional neural networks using face attribute is proposed which provides different choices for supporting cryptographic processes to… More >

  • Open Access

    ARTICLE

    Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT

    J. R. Arunkumar1,*, S. Velmurugan2, Balarengadurai Chinnaiah3, G. Charulatha4, M. Ramkumar Prabhu4, A. Prabhu Chakkaravarthy5

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2635-2645, 2023, DOI:10.32604/csse.2023.031605

    Abstract Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of applications and greatly attractive benefits, for example, self-governing, low expenditure on execution and data communication, long-term function, and unsupervised access to the network. The Internet of Things (IoT) is an attractive, exciting paradigm. By applying communication technologies in sensors and supervising features, WSNs have initiated communication between the IoT devices. Though IoT offers access to the highest amount of information collected through WSNs, it leads to privacy management problems. Hence, this paper provides a Logistic Regression machine learning with the Elliptical Curve Cryptography technique (LRECC) to… More >

  • Open Access

    ARTICLE

    Secured Health Data Transmission Using Lagrange Interpolation and Artificial Neural Network

    S. Vidhya1,*, V. Kalaivani2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2673-2692, 2023, DOI:10.32604/csse.2023.027724

    Abstract In recent decades, the cloud computing contributes a prominent role in health care sector as the patient health records are transferred and collected using cloud computing services. The doctors have switched to cloud computing as it provides multiple advantageous measures including wide storage space and easy availability without any limitations. This necessitates the medical field to be redesigned by cloud technology to preserve information about patient’s critical diseases, electrocardiogram (ECG) reports, and payment details. The proposed work utilizes a hybrid cloud pattern to share Massachusetts Institute of Technology-Beth Israel Hospital (MIT-BIH) resources over the private and public cloud. The stored… More >

  • Open Access

    ARTICLE

    An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

    Muhammad Nadeem1, Ali Arshad2,*, Saman Riaz2, Syeda Wajiha Zahra1, Ashit Kumar Dutta3, Moteeb Al Moteri4, Sultan Almotairi5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4059-4079, 2023, DOI:10.32604/cmc.2023.032882

    Abstract Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse. If this algorithm is applied to the cloud network, the attacker will not be able to access the data. To encrypt the data, the values of the bytes have been obtained by converting the plain text to ASCII. A key has been… More >

  • Open Access

    ARTICLE

    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2625-2640, 2023, DOI:10.32604/cmc.2023.030899

    Abstract Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double… More >

  • Open Access

    ARTICLE

    An Intelligent Cardiovascular Diseases Prediction System Focused on Privacy

    Manjur Kolhar*, Mohammed Misfer

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 529-542, 2023, DOI:10.32604/iasc.2023.030098

    Abstract Machine learning (ML) and cloud computing have now evolved to the point where they are able to be used effectively. Further improvement, however, is required when both of these technologies are combined to reap maximum benefits. A way of improving the system is by enabling healthcare workers to select appropriate machine learning algorithms for prediction and, secondly, by preserving the privacy of patient data so that it cannot be misused. The purpose of this paper is to combine these promising technologies to maintain the privacy of patient data during the disease prediction process. Treatment of heart failure may be improved… More >

  • Open Access

    ARTICLE

    Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

    Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1723-1734, 2023, DOI:10.32604/cmc.2023.032838

    Abstract Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets of any organization against cybercriminal activities. The Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid convergence. But when it comes to security, it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better security. Many applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the Advanced Encryption Standard (AES) algorithm… More >

  • Open Access

    ARTICLE

    Quantum Oblivious Transfer with Reusable Bell State

    Shu-Yu Kuo1, Kuo-Chun Tseng2, Yao-Hsin Chou3, Fan-Hsun Tseng4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 915-932, 2023, DOI:10.32604/cmc.2023.032320

    Abstract In cryptography, oblivious transfer (OT) is an important multi-party cryptographic primitive and protocol, that is suitable for many upper-layer applications, such as secure computation, remote coin-flipping, electrical contract signing and exchanging secrets simultaneously. However, some no-go theorems have been established, indicating that one-out-of-two quantum oblivious transfer (QOT) protocols with unconditional security are impossible. Fortunately, some one-out-of-two QOT protocols using the concept of Crépeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem, but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT. This paper proposes a novel and efficient one-out-of-two… More >

Displaying 21-30 on page 3 of 95. Per Page