Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (263)
  • Open Access

    ARTICLE

    SIMAD: Secure Intelligent Method for IoT-Fog Environments Attacks Detection

    Wided Ben Daoud1, Sami Mahfoudhi2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2727-2742, 2022, DOI:10.32604/cmc.2022.020141

    Abstract The Internet of Thing IoT paradigm has emerged in numerous domains and it has achieved an exponential progress. Nevertheless, alongside this advancement, IoT networks are facing an ever-increasing rate of security risks because of the continuous and rapid changes in network environments. In order to overcome these security challenges, the fog system has delivered a powerful environment that provides additional resources for a more improved data security. However, because of the emerging of various breaches, several attacks are ceaselessly emerging in IoT and Fog environment. Consequently, the new emerging applications in IoT-Fog environment still require novel, distributed, and intelligent security… More >

  • Open Access

    ARTICLE

    Secure Watermarking Scheme for Color DICOM Images in Telemedicine Applications

    Kamred Udham Singh1, Hatem Salem Abu-Hamatta2, Abhishek Kumar3, Achintya Singhal4, Mamoon Rashid5,*, A. K. Bashir6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2525-2542, 2022, DOI:10.32604/cmc.2022.019302

    Abstract Teleradiology plays a vital role in the medical field, which permits transmitting medical and imaging data over a communication network. It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes. The transmission of this medical data over a network raises the problems of legal, ethical issues, privacy, and copyright authenticity. The copyright protection of medical images is a significant issue in the medical field. Watermarking schemes are used to address these issues. A gray-level or binary image is used as a watermark frequently in color image watermarking schemes. In this paper, the authors propose a novel… More >

  • Open Access

    ARTICLE

    Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications

    Jinsu Kim1, Sungwook Ryu2, Namje Park1,3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4169-4184, 2022, DOI:10.32604/cmc.2022.019277

    Abstract A significant number of cloud storage environments are already implementing deduplication technology. Due to the nature of the cloud environment, a storage server capable of accommodating large-capacity storage is required. As storage capacity increases, additional storage solutions are required. By leveraging deduplication, you can fundamentally solve the cost problem. However, deduplication poses privacy concerns due to the structure itself. In this paper, we point out the privacy infringement problem and propose a new deduplication technique to solve it. In the proposed technique, since the user’s map structure and files are not stored on the server, the file uploader list cannot… More >

  • Open Access

    ARTICLE

    Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

    V. Rajkumar1,*, M. Prakash2, V. Vennila3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 779-793, 2022, DOI:10.32604/csse.2022.019622

    Abstract Cloud storage is an incipient technology in today’s world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to prove their identity to the… More >

  • Open Access

    ARTICLE

    Secure Rotation Invariant Face Detection System for Authentication

    Amit Verma1, Mohammed Baljon2, Shailendra Mishra2,*, Iqbaldeep Kaur1, Ritika Saini1, Sharad Saxena3, Sanjay Kumar Sharma4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1955-1974, 2022, DOI:10.32604/cmc.2022.020084

    Abstract Biometric applications widely use the face as a component for recognition and automatic detection. Face rotation is a variable component and makes face detection a complex and challenging task with varied angles and rotation. This problem has been investigated, and a novice algorithm, namely RIFDS (Rotation Invariant Face Detection System), has been devised. The objective of the paper is to implement a robust method for face detection taken at various angle. Further to achieve better results than known algorithms for face detection. In RIFDS Polar Harmonic Transforms (PHT) technique is combined with Multi-Block Local Binary Pattern (MBLBP) in a hybrid… More >

  • Open Access

    ARTICLE

    Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel

    Osama S. Faragallah1,*, M. Farouk2, Hala S. El-sayed3, Mohsen A.M. El-bendary4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1603-1615, 2022, DOI:10.32604/cmc.2022.019710

    Abstract Audio communications and computer networking play essential roles in our daily lives, including many domains with different scopes. Developments in these technologies are quick. In consequence, there is a dire need to secure these technologies up to date. This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel. Also, the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains. The discrete cosine transform (DCT), the discrete sine transform (DST), and the discrete wavelet transform (DWT) are investigated in the utilized multiple secret key-based audio cryptosystem.… More >

  • Open Access

    ARTICLE

    Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment

    D. Prabakaran1,*, Shyamala Ramachandran2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1781-1798, 2022, DOI:10.32604/cmc.2022.019591

    Abstract The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019, and many more cloud server… More >

  • Open Access

    ARTICLE

    A Secure Communication Protocol for Unmanned Aerial Vehicles

    Navid Ali Khan1, N. Z. Jhanjhi1,*, Sarfraz Nawaz Brohi2, Abdulwahab Ali Almazroi3, Abdulaleem Ali Almazroi4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 601-618, 2022, DOI:10.32604/cmc.2022.019419

    Abstract Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Station. The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS. In order to increase the transfer speed and efficiency, the Mavlink does not encrypt the messages. As a result, the protocol is vulnerable to various security attacks such as Eavesdropping, GPS Spoofing, and DDoS. In this study, we tackle the problem and secure… More >

  • Open Access

    ARTICLE

    Utilization of HEVC ChaCha20-Based Selective Encryption for Secure Telehealth Video Conferencing

    Osama S. Faragallah1,*, Ahmed I. Sallam2, Hala S. El-sayed3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 831-845, 2022, DOI:10.32604/cmc.2022.019151

    Abstract Coronavirus (COVID-19) is a contagious disease that causes exceptional effect on healthcare organizations worldwide with dangerous impact on medical services within the hospitals. Because of the fast spread of COVID-19, the healthcare facilities could be a big source of disease infection. So, healthcare video consultations should be used to decrease face-to-face communication between clinician and patients. Healthcare video consultations may be beneficial for some COVID-19 conditions and reduce the need for face-to-face contact with a potentially positive patient without symptoms. These conditions are like top clinicians who provide remote consultations to develop treatment methodology and follow-up remotely, patients who consult… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)

    Kanwal Imran1,*, Nasreen Anjum2, Abdullah Alghamdi3, Asadullah Shaikh3, Mohammed Hamdi3, Saeed Mahfooz1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1033-1052, 2022, DOI:10.32604/cmc.2022.018589

    Abstract IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard, thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network. The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard), but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher layers. The sensor nodes in… More >

Displaying 181-190 on page 19 of 263. Per Page