Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (103)
  • Open Access

    ARTICLE

    Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm

    Faguo Wu1,2,3,4,*, Bo Zhou2, Jie Jiang5, Tianyu Lei1, Jiale Song1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 957-973, 2023, DOI:10.32604/cmc.2023.038771 - 08 June 2023

    Abstract With the rapid increase in demand for data trustworthiness and data security, distributed data storage technology represented by blockchain has received unprecedented attention. These technologies have been suggested for various uses because of their remarkable ability to offer decentralization, high autonomy, full process traceability, and tamper resistance. Blockchain enables the exchange of information and value in an untrusted environment. There has been a significant increase in attention to the confidentiality and privacy preservation of blockchain technology. Ensuring data privacy is a critical concern in cryptography, and one of the most important protocols used to achieve… More >

  • Open Access

    ARTICLE

    High Efficient Reconfigurable and Self Testable Architecture for Sensor Node

    G. Venkatesan1,*, N. Ramadass2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3979-3991, 2023, DOI:10.32604/csse.2023.031627 - 03 April 2023

    Abstract Sensor networks are regularly sent to monitor certain physical properties that run in length from divisions of a second to many months or indeed several years. Nodes must advance their energy use for expanding network lifetime. The fault detection of the network node is very significant for guaranteeing the correctness of monitoring results. Due to different network resource constraints and malicious attacks, security assurance in wireless sensor networks has been a difficult task. The implementation of these features requires larger space due to distributed module. This research work proposes new sensor node architecture integrated with More >

  • Open Access

    ARTICLE

    Enhanced Parallelized DNA-Coded Stream Cipher Based on Multiplayer Prisoners’ Dilemma

    Khaled M. Suwais*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2685-2704, 2023, DOI:10.32604/cmc.2023.036161 - 31 March 2023

    Abstract Data encryption is essential in securing exchanged data between connected parties. Encryption is the process of transforming readable text into scrambled, unreadable text using secure keys. Stream ciphers are one type of an encryption algorithm that relies on only one key for decryption and as well as encryption. Many existing encryption algorithms are developed based on either a mathematical foundation or on other biological, social or physical behaviours. One technique is to utilise the behavioural aspects of game theory in a stream cipher. In this paper, we introduce an enhanced Deoxyribonucleic acid (DNA)-coded stream cipher More >

  • Open Access

    ARTICLE

    Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

    Ali Arshad1,*, Muhammad Nadeem2, Saman Riaz1, Syeda Wajiha Zahra2, Ashit Kumar Dutta3, Zaid Alzaid4, Rana Alabdan5, Badr Almutairi6, Sultan Almotairi4,7

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3065-3089, 2023, DOI:10.32604/cmc.2023.035695 - 31 March 2023

    Abstract There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker… More >

  • Open Access

    ARTICLE

    Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform

    Hesham Alhumyani*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2933-2945, 2023, DOI:10.32604/iasc.2023.034689 - 15 March 2023

    Abstract This paper introduces an efficient image cryptography system. The proposed image cryptography system is based on employing the two-dimensional (2D) chaotic henon map (CHM) in the Discrete Fourier Transform (DFT). The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures. In the proposed DFT-based CHM image cryptography, the confusion is employed using the CHM while the diffusion is realized using the DFT. So, the proposed DFT-based CHM image cryptography achieves both confusion and diffusion characteristics. The encryption procedure starts by applying the DFT on the image then the DFT More >

  • Open Access

    ARTICLE

    Smart Grid Communication Under Elliptic Curve Cryptography

    B. Prabakaran1,*, T. R. Sumithira2, V. Nagaraj3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2333-2347, 2023, DOI:10.32604/iasc.2023.029725 - 05 January 2023

    Abstract Smart Grids (SGs) are introduced as a solution for standard power distribution. The significant capabilities of smart grids help to monitor consumer behaviors and power systems. However, the delay-sensitive network faces numerous challenges in which security and privacy gain more attention. Threats to transmitted messages, control over smart grid information and user privacy are the major concerns in smart grid security. Providing secure communication between the service provider and the user is the only possible solution for these security issues. So, this research work presents an efficient mutual authentication and key agreement protocol for smart More >

  • Open Access

    ARTICLE

    Cryptographic Algorithm for Enhancing Data Security in Wireless IoT Sensor Networks

    A. Bhavani, V. Nithya*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1381-1393, 2023, DOI:10.32604/iasc.2023.029397 - 05 January 2023

    Abstract Wireless IoT Sensor Network can handle audio, video, text, etc., through the interconnection of ubiquitous devices. The entertainment and application-centric network relies on its autonomous nodes for handling large streams of multimedia data. Security breaches and threats due to insider attacks reduce the data handling and distribution capacity of the nodes. For addressing the insider attacks problem, Session-Critical Distributed Authentication Method (SCDAM) is proposed. The proposed method relies on short-lived concealed authentication based on an improved elliptic curve cryptography (ECC) algorithm. In this authentication, the session time and the interrupts are accounted for, providing end-to-end More >

  • Open Access

    ARTICLE

    A Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption

    Yongsheng Hu*, Liyong Nan

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6555-6571, 2023, DOI:10.32604/cmc.2023.036090 - 28 December 2022

    Abstract The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem. The classical chaotic map has simple dynamic behavior and few control parameters, so it is not suitable for modern cryptography. In this paper, we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map (2D-SSCDB). The 2D-SSCDB has a simple structure but has complex dynamic behavior. The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior, and the parameter space in the hyperchaotic state is extensive and continuous. Trajectory analysis and… More >

  • Open Access

    ARTICLE

    EsECC_SDN: Attack Detection and Classification Model for MANET

    Veera Ankalu Vuyyuru1, Youseef Alotaibi2, Neenavath Veeraiah3,*, Saleh Alghamdi4, Korimilli Sirisha5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6665-6688, 2023, DOI:10.32604/cmc.2023.032140 - 28 December 2022

    Abstract Mobile Ad Hoc Networks (MANET) is the framework for social networking with a realistic framework. In the MANET environment, based on the query, information is transmitted between the sender and receiver. In the MANET network, the nodes within the communication range are involved in data transmission. Even the nodes that lie outside of the communication range are involved in the transmission of relay messages. However, due to the openness and frequent mobility of nodes, they are subjected to the vast range of security threats in MANET. Hence, it is necessary to develop an appropriate security… More >

  • Open Access

    ARTICLE

    Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics

    S. Aanjanadevi1,*, S. Aanjankumar2, K. R. Ramela3, V. Palanisamy4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2351-2362, 2023, DOI:10.32604/csse.2023.031893 - 21 December 2022

    Abstract Due to the enormous usage of the internet for transmission of data over a network, security and authenticity become major risks. Major challenges encountered in biometric system are the misuse of enrolled biometric templates stored in database server. To describe these issues various algorithms are implemented to deliver better protection to biometric traits such as physical (Face, fingerprint, Ear etc.) and behavioural (Gesture, Voice, tying etc.) by means of matching and verification process. In this work, biometric security system with fuzzy extractor and convolutional neural networks using face attribute is proposed which provides different choices… More >

Displaying 21-30 on page 3 of 103. Per Page