Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (261)
  • Open Access

    ARTICLE

    Device-Independent Quantum Key Distribution Protocol Based on Hyper-Entanglement

    Yan Chang1, *, Shibin Zhang1, Lili Yan1, Xueyang Li1, Tian Cao1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 879-896, 2020, DOI:10.32604/cmc.2020.010042

    Abstract The secure key rate of quantum key distribution (QKD) is greatly reduced because of the untrusted devices. In this paper, to raise the secure key rate of QKD, a device-independent quantum key distribution (DIQKD) protocol is proposed based on hyper-entangled states and Bell inequalities. The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition. Based on the formalization of Clauser-Horne Shimony-Holt (CHSH) violation measurement on local correlation, the probability of a secure secret bit is obtained, which is produced by a pair of hyper-entangled particles. By analyzing the secure secret… More >

  • Open Access

    ARTICLE

    An Application Review of Artificial Intelligence in Prevention and Cure of COVID-19 Pandemic

    Peipeng Yu1, Zhihua Xia1, *, Jianwei Fei1, Sunil Kumar Jha1, 2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 743-760, 2020, DOI:10.32604/cmc.2020.011391

    Abstract Coronaviruses are a well-known family of viruses that can infect humans or animals. Recently, the new coronavirus (COVID-19) has spread worldwide. All countries in the world are working hard to control the coronavirus disease. However, many countries are faced with a lack of medical equipment and an insufficient number of medical personnel because of the limitations of the medical system, which leads to the mass spread of diseases. As a powerful tool, artificial intelligence (AI) has been successfully applied to solve various complex problems ranging from big data analysis to computer vision. In the process of epidemic control, many algorithms… More >

  • Open Access

    ARTICLE

    Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data

    Bao Le Nguyen1, E. Laxmi Lydia2, Mohamed Elhoseny3, Irina V. Pustokhina4, Denis A. Pustokhin5, Mahmoud Mohamed Selim6, Gia Nhu Nguyen7, 8, K. Shankar9, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 87-107, 2020, DOI:10.32604/cmc.2020.011599

    Abstract In present digital era, an exponential increase in Internet of Things (IoT) devices poses several design issues for business concerning security and privacy. Earlier studies indicate that the blockchain technology is found to be a significant solution to resolve the challenges of data security exist in IoT. In this view, this paper presents a new privacy-preserving Secure Ant Colony optimization with Multi Kernel Support Vector Machine (ACOMKSVM) with Elliptical Curve cryptosystem (ECC) for secure and reliable IoT data sharing. This program uses blockchain to ensure protection and integrity of some data while it has the technology to create secure ACOMKSVM… More >

  • Open Access

    ARTICLE

    A Secure Three-Factor Authenticated Key Agreement Scheme for Multi-Server Environment

    Meichen Xia1, *, Shiliang Li1,, Liu Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1673-1689, 2020, DOI:10.32604/cmc.2020.010177

    Abstract Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years. However, traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service. Moreover, it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party. In order to overcome these difficulties, we designed a secure threefactor multi-server authenticated key agreement protocol based on elliptic curve cryptography, which needs the… More >

  • Open Access

    ARTICLE

    Secure Sharing Scheme of Sensitive Data in the Precision Medicine System

    Deukhun Kim1, Heejin Kim2, Jin Kwak3, *

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1527-1553, 2020, DOI:10.32604/cmc.2020.010535

    Abstract Numerous industries, especially the medical industry, are likely to exhibit significant developments in the future. Ever since the announcement of the precision medicine initiative by the United States in 2015, interest in the field has considerably increased. The techniques of precision medicine are employed to provide optimal treatment and medical services to patients, in addition to the prevention and management of diseases via the collection and analysis of big data related to their individual genetic characteristics, occupation, living environment, and dietary habits. As this involves the accumulation and utilization of sensitive information, such as patient history, DNA, and personal details,… More >

  • Open Access

    ARTICLE

    Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack

    Xiaoling Yu1, Chungen Xu1, *, Lei Xu1, Yuntao Wang2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1107-1125, 2020, DOI:10.32604/cmc.2020.09680

    Abstract To save the local storage, users store the data on the cloud server who offers convenient internet services. To guarantee the data privacy, users encrypt the data before uploading them into the cloud server. Since encryption can reduce the data availability, public-key encryption with keyword search (PEKS) is developed to achieve the retrieval of the encrypted data without decrypting them. However, most PEKS schemes cannot resist quantum computing attack, because the corresponding hardness assumptions are some number theory problems that can be solved efficiently under quantum computers. Besides, the traditional PEKS schemes have an inherent security issue that they cannot… More >

  • Open Access

    ARTICLE

    Cipherchain: A Secure and Efficient Ciphertext Blockchain via mPECK

    Hailin Chen1, Gang Xu3, Yuling Chen2, Xiubo Chen1, 2, *, Yixian Yang1, 2, Ruibin Fan4, Kaixiang Zhang4, Huizhong Li4

    Journal of Quantum Computing, Vol.2, No.1, pp. 57-83, 2020, DOI:10.32604/jqc.2020.09291

    Abstract Most existing blockchain schemes are based on the design concept “openness and transparency” to realize data security, which usually require transaction data to be presented in the form of plaintext. However, it inevitably brings the issues with respect to data privacy and operating performance. In this paper, we proposed a novel blockchain scheme called Cipherchain, which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed. Specifically in our scheme, transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search… More >

  • Open Access

    ARTICLE

    A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique

    Shahid Rahman1, Fahad Masood2, Wajid Ullah Khan2, Niamat Ullah1, Fazal Qudus Khan3, Georgios Tsaramirsis3, Sadeeq Jan4, *, Majid Ashraf5

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 31-61, 2020, DOI:10.32604/cmc.2020.09186

    Abstract Steganography aims to hide the messages from unauthorized persons for various purposes, e.g., military correspondence, financial transaction data. Securing the data during transmission is of utmost importance these days. The confidentiality, integrity, and availability of the data are at risk because of the emerging technologies and complexity in software applications, and therefore, there is a need to secure such systems and data. There are various methodologies to deal with security issues when utilizing an open system like the Internet. This research proposes a new technique in steganography within RGB shading space to achieve enhanced security compared with existing systems. We… More >

  • Open Access

    ARTICLE

    Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States

    Lili Yan1, *, Shibin Zhang1, Yan Chang1, Zhibin Sun2, Zhiwei Sheng1

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1297-1307, 2020, DOI:10.32604/cmc.2020.09873

    Abstract Quantum secure direct communication (QSDC) can transmit secret messages directly from one user to another without first establishing a shared secret key, which is different from quantum key distribution. In this paper, we propose a novel quantum secure direct communication protocol based on signal photons and Bell states. Before the execution of the proposed protocol, two participants Alice and Bob exchange their corresponding identity IDA and IDB through quantum key distribution and keep them secret, respectively. Then the message sender, Alice, encodes each secret message bit into two single photons (| 01〉or|10〉) or a Bell state , and composes… More >

  • Open Access

    ARTICLE

    Green Composite Material Made from Typha latifolia Fibres Bonded with an Epoxidized Linseed Oil/Tall Oil-Based Polyamide Binder System

    Günter Wuzella1, Arunjunai Raj Mahendran1, Andreas Kandelbauer2,*

    Journal of Renewable Materials, Vol.8, No.5, pp. 499-512, 2020, DOI:10.32604/jrm.2020.09615

    Abstract Here, we report the mechanical and water sorption properties of a green composite based on Typha latifolia fibres. The composite was prepared either completely binder-less or bonded with 10% (w/w) of a bio-based resin which was a mixture of an epoxidized linseed oil and a tall-oil based polyamide. The flexural modulus of elasticity, the flexural strength and the water absorption of hot pressed Typha panels were measured and the influence of pressing time and panel density on these properties was investigated. The cure kinetics of the biobased resin was analyzed by differential scanning calorimetry (DSC) in combination with the iso-conversional… More >

Displaying 231-240 on page 24 of 261. Per Page