Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (311)
  • Open Access

    ARTICLE

    A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code

    Xinwei Zhong*, Lizhi Xiong, Zhihua Xia

    Journal on Big Data, Vol.3, No.2, pp. 85-95, 2021, DOI:10.32604/jbd.2021.018618 - 13 April 2021

    Abstract With the rise of the Internet of Things (IoT), various devices in life and industry are closely linked. Because of its high payload, stable error correction capability, and convenience in reading and writing, Quick Response (QR) code has been widely researched in IoT. However, the security of privacy data in IoT is also a very important issue. At the same time, because IoT is developing towards low-power devices in order to be applied to more fields, the technology protecting the security of private needs to have the characteristics of low computational complexity. Visual Secret Sharing… More >

  • Open Access

    ARTICLE

    Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records

    Mueen Uddin1,*, M. S. Memon2, Irfana Memon2, Imtiaz Ali2, Jamshed Memon3, Maha Abdelhaq4, Raed Alsaqour5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2377-2397, 2021, DOI:10.32604/cmc.2021.015354 - 13 April 2021

    Abstract Background: Electronic Health Record (EHR) systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally. However, the existing EHR systems mostly lack in providing appropriate security, entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures. Objective: To solve this delicate problem, we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems. Methodology: In our EHR blockchain system, Peer nodes from various organizations (stakeholders)… More >

  • Open Access

    ARTICLE

    Secure Image Authentication Using Watermarking and Blockchain

    Alsehli Abrar1, Wadood Abdul1,*, Sanaa Ghouzali2

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 577-591, 2021, DOI:10.32604/iasc.2021.016382 - 01 April 2021

    Abstract Image authentication is an important field that employs many different approaches and has several significant applications. In the proposed approach, we used a combination of two techniques to achieve authentication. Image watermarking is one of the techniques that has been used in many studies but the authentication field still needs to be studied. Blockchain technology is a relatively new technology that has significant research potential related to image authentication. The watermark is embedded into the third-level discrete wavelet transform (DWT) in the middle frequency regions to achieve security and imperceptibility goals. Peak signal-to-noise ratio PSNR,… More >

  • Open Access

    ARTICLE

    A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks

    A. F. M. Suaib Akhter1,*, A. F. M. Shahen Shah2, Mohiuddin Ahmed3, Nour Moustafa4, Unal Çavuşoğlu1, Ahmet Zengin1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 229-246, 2021, DOI:10.32604/cmc.2021.015447 - 22 March 2021

    Abstract Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM).… More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646 - 17 March 2021

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must… More >

  • Open Access

    ARTICLE

    Secure and Energy Efficient Data Transmission Model for WSN

    Anuj Kumar Singh1, Mohammed Alshehri2,*, Shashi Bhushan3, Manoj Kumar3, Osama Alfarraj4, Kamal Raj Pardarshani5

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 761-769, 2021, DOI:10.32604/iasc.2021.012806 - 01 March 2021

    Abstract Wireless sensor networks (WSNs) have been used in numerous delicate checking, observation, and surveillance systems that use sensitive data. When a WSN utilizes various data clustering techniques, data is moved to the cluster head (CH) of the corresponding cluster area. Cluster Head further communicates the information to the sink node. In a WSN, a network owner (NO) does not validate a sensor before connecting to the network, so faulty nodes may likely attach to the network to sense the data and attempt to release the information to unauthorized persons. Further, a malicious node may become… More >

  • Open Access

    ARTICLE

    Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

    V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4005-4018, 2021, DOI:10.32604/cmc.2021.014643 - 01 March 2021

    Abstract Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need… More >

  • Open Access

    ARTICLE

    A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain

    Xizi Peng1, Jinquan Zhang1,*, Shibin Zhang1, Wunan Wan1, Hao Chen1, Jinyue Xia2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 265-281, 2021, DOI:10.32604/csse.2021.014557 - 01 March 2021

    Abstract In the existing Electronic Health Records (EHRs), the medical information of patients is completely controlled by various medical institutions. As such, patients have no dominant power over their own EHRs. These personal data are not only inconvenient to access and share, but are also prone to cause privacy disclosure. The blockchain technology provides a new development direction in the medical field. Blockchain-based EHRs are characterized by decentralization, openness and non-tampering of records, which enable patients to better manage their own EHRs. In order to better protect the privacy of patients, only designated receivers can access… More >

  • Open Access

    ARTICLE

    Improved Channel Reciprocity for Secure Communication in Next Generation Wireless Systems

    Imtisal Qadeer1,2, Muhammad Khurram Ehsan3,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2619-2630, 2021, DOI:10.32604/cmc.2021.015641 - 05 February 2021

    Abstract To secure the wireless connection between devices with low computational power has been a challenging problem due to heterogeneity in operating devices, device to device communication in Internet of Things (IoTs) and 5G wireless systems. Physical layer key generation (PLKG) tackles this secrecy problem by introducing private keys among two connecting devices through wireless medium. In this paper, relative calibration is used as a method to enhance channel reciprocity which in turn increases the performance of the key generation process. Channel reciprocity based key generation is emerged as better PLKG methodology to obtain secure wireless More >

  • Open Access

    ARTICLE

    An Efficient Sound and Data Steganography Based Secure Authentication System

    Debajit Datta1, Lalit Garg2,*, Kathiravan Srinivasan3, Atsushi Inoue4, G. Thippa Reddy3, M. Praveen Kumar Reddy3, K. Ramesh5, Nidal Nasser6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 723-751, 2021, DOI:10.32604/cmc.2021.014802 - 12 January 2021

    Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and… More >

Displaying 251-260 on page 26 of 311. Per Page