Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    Enhancing Security by Using GIFT and ECC Encryption Method in Multi-Tenant Datacenters

    Jin Wang1, Ying Liu1, Shuying Rao1, R. Simon Sherratt2, Jinbin Hu1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3849-3865, 2023, DOI:10.32604/cmc.2023.037150

    Abstract Data security and user privacy have become crucial elements in multi-tenant data centers. Various traffic types in the multi-tenant data center in the cloud environment have their characteristics and requirements. In the data center network (DCN), short and long flows are sensitive to low latency and high throughput, respectively. The traditional security processing approaches, however, neglect these characteristics and requirements. This paper proposes a fine-grained security enhancement mechanism (SEM) to solve the problem of heterogeneous traffic and reduce the traffic completion time (FCT) of short flows while ensuring the security of multi-tenant traffic transmission. Specifically, for short flows in DCN,… More >

  • Open Access

    ARTICLE

    EsECC_SDN: Attack Detection and Classification Model for MANET

    Veera Ankalu Vuyyuru1, Youseef Alotaibi2, Neenavath Veeraiah3,*, Saleh Alghamdi4, Korimilli Sirisha5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6665-6688, 2023, DOI:10.32604/cmc.2023.032140

    Abstract Mobile Ad Hoc Networks (MANET) is the framework for social networking with a realistic framework. In the MANET environment, based on the query, information is transmitted between the sender and receiver. In the MANET network, the nodes within the communication range are involved in data transmission. Even the nodes that lie outside of the communication range are involved in the transmission of relay messages. However, due to the openness and frequent mobility of nodes, they are subjected to the vast range of security threats in MANET. Hence, it is necessary to develop an appropriate security mechanism for the data MANET… More >

  • Open Access

    ARTICLE

    A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

    Mouna Bedoui1,*, Belgacem Bouallegue1,2, Abdelmoty M. Ahmed2, Belgacem Hamdi1,3, Mohsen Machhout1, Mahmoud1, M. Khattab2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2177-2193, 2023, DOI:10.32604/csse.2023.026516

    Abstract Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Signature Scheme for IoT in Healthcare

    Latika Kakkar1, Deepali Gupta1, Sarvesh Tanwar2, Sapna Saxena3, Khalid Alsubhi4, Divya Anand5, Irene Delgado Noya6,7, Nitin Goyal1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6151-6168, 2022, DOI:10.32604/cmc.2022.023769

    Abstract To provide faster access to the treatment of patients, healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient. There is a huge limitation in the sensing layer as the IoT devices here have low computational power, limited storage and less battery life. So, this huge amount of data needs to be stored on the cloud. The information and the data sensed by these devices is made accessible on the internet from where medical staff, doctors, relatives and family members can access this information. This helps in improving the treatment as… More >

  • Open Access

    ARTICLE

    A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network

    W. Gracy Theresa1,*, A. Gayathri2, P. Rama3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1337-1351, 2023, DOI:10.32604/iasc.2023.028425

    Abstract Mobile computing is the most powerful application for network communication and connectivity, given recent breakthroughs in the field of wireless networks or Mobile Ad-hoc networks (MANETs). There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision. For most applications, a framework must ensure that the retrieved data reflects the transmitted data. Before driving to other nodes, if the frame between the two nodes is deformed in the data-link layer, it must be repaired. Most link-layer protocols immediately disregard the frame and enable the high-layer protocols… More >

  • Open Access

    ARTICLE

    An AOP-Based Security Verification Environment for KECCAK Hash Algorithm

    Hassen Mestiri1,2,3,*, Imen Barraj1,4,5, Mohsen Machhout3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4051-4066, 2022, DOI:10.32604/cmc.2022.029794

    Abstract Robustness of the electronic cryptographic devices against fault injection attacks is a great concern to ensure security. Due to significant resource constraints, these devices are limited in their capabilities. The increasing complexity of cryptographic devices necessitates the development of a fast simulation environment capable of performing security tests against fault injection attacks. SystemC is a good choice for Electronic System Level (ESL) modeling since it enables models to run at a faster rate. To enable fault injection and detection inside a SystemC cryptographic model, however, the model’s source code must be updated. Without altering the source code, Aspect-Oriented Programming (AOP)… More >

  • Open Access

    ARTICLE

    ESSD: Energy Saving and Securing Data Algorithm for WSNs Security

    Manar M. Aldaseen1, Khaled M. Matrouk1, Laiali H. Almazaydeh2,*, Khaled M. Elleithy3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3969-3981, 2022, DOI:10.32604/cmc.2022.028520

    Abstract The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against the attacks, an effective security solution is required. However, the limits of these networks’ battery-based energy to the sensor are the most critical impediments to selecting cryptographic techniques. Consequently, finding a suitable algorithm that achieves the least energy consumption in data encryption and decryption and providing a highly protected system for data remains the fundamental problem. In this research, the main objective is to obtain data security during transmission by proposing a… More >

  • Open Access

    ARTICLE

    Artificial Monitoring of Eccentric Synchronous Reluctance Motors Using Neural Networks

    Shuguang Wei, Jiaqi Li*, Zixu Zhao, Dong Yuan

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1035-1052, 2022, DOI:10.32604/cmc.2022.024201

    Abstract This paper proposes an artificial neural network for monitoring and detecting the eccentric error of synchronous reluctance motors. Firstly, a 15 kW synchronous reluctance motor is introduced and took as a case study to investigate the effects of eccentric rotor. Then, the equivalent magnetic circuits of the studied motor are analyzed and developed, in cases of dynamic eccentric rotor and static eccentric rotor condition, respectively. After that, the analytical equations of the studied motor are derived, in terms of its air-gap flux density, electromagnetic torque, and electromagnetic force, followed by the electromagnetic finite element analyses. Then, the modal analyses of the… More >

  • Open Access

    ARTICLE

    Experimental Investigation of the Creep Behaviour of Glulam Compression-Bending Members

    Yifei Yin, Lirong Qu, Weidong Lu*, Chengshuai Li

    Journal of Renewable Materials, Vol.10, No.6, pp. 1517-1535, 2022, DOI:10.32604/jrm.2022.018149

    Abstract Creep test results of glulam members under compression and bending were studied in this paper. The creep tests were conducted to investigate the influence of the stress level and relative eccentricity on the creep deformation of glulam members. The test results showed that the creep deformation trends of glulam members under long-term compression and bending loading were similar; the creep deformation increased with increases in both the stress level and relative eccentricity. However, the relative creep deformation decreased with the increase in both the stress level and relative eccentricity under long-term loading, and a five-parameter creep model was proposed to… More > Graphic Abstract

    Experimental Investigation of the Creep Behaviour of Glulam Compression-Bending Members

  • Open Access

    ARTICLE

    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Hind A. Alshambri1,* Fawaz Alassery2

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112

    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of security challenges in terms of cyberattacks… More >

Displaying 1-10 on page 1 of 29. Per Page  

Share Link