Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    Gang Xu1, Yibo Cao1, Shiyuan Xu1, Xin Liu2,*, Xiu-Bo Chen3, Yiying Yu1, Xiaojun Wang4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5429-5441, 2022, DOI:10.32604/cmc.2022.028562 - 21 April 2022

    Abstract With the increasing popularity of cloud storage, data security on the cloud has become increasingly visible. Searchable encryption has the ability to realize the privacy protection and security of data in the cloud. However, with the continuous development of quantum computing, the standard Public-key Encryption with Keyword Search (PEKS) scheme cannot resist quantum-based keyword guessing attacks. Further, the credibility of the server also poses a significant threat to the security of the retrieval process. This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems. Firstly, we design More >

  • Open Access

    ARTICLE

    Stream Cipher Based on Game Theory and DNA Coding

    Khaled Suwais*

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1815-1834, 2022, DOI:10.32604/iasc.2022.025076 - 24 March 2022

    Abstract Securing communication over public communication channels is one of the challenging issues in the field of cryptography and information security. A stream cipher is presented as an approach for securing exchanged data between different parties through encryption. The core of stream cipher relies on its keystream generator, that is responsible for generating random and secure keystream of encrypting streaming data. Thus, the security of the keystream is measured by its randomness and its resistance to statistical and cryptanalytic attacks. As there is always a trade-off between the security and performance while designing new cryptographic primitives, More >

  • Open Access

    ARTICLE

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684 - 14 January 2022

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark… More >

  • Open Access

    ARTICLE

    Construction of Key-dependent S-box for Secure Cloud Storage

    A. Indumathi*, G. Sumathi

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1509-1524, 2022, DOI:10.32604/iasc.2022.022743 - 09 December 2021

    Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation… More >

  • Open Access

    ARTICLE

    Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security

    Rashad Mahmood Saqib1, Adnan Shahid Khan1,*, Yasir Javed2, Shakil Ahmad2, Kashif Nisar3, Irshad A. Abbasi4, Muhammad Reazul Haque5, Azlina Ahmadi Julaihi1

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1633-1647, 2022, DOI:10.32604/iasc.2022.021786 - 09 December 2021

    Abstract This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies have been done in the multi-factor authentication discipline, and most of them proposed the best possible approaches, but there are very limited… More >

  • Open Access

    ARTICLE

    An Effective and Secure Quality Assurance System for a Computer Science Program

    Mohammad Alkhatib*

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 975-995, 2022, DOI:10.32604/csse.2022.021398 - 10 November 2021

    Abstract Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs) assessment and continuous quality improvement represent core components of the quality assurance system (QAS). Current assessment methods suffer deficiencies related to accuracy and reliability, and they lack well-organized processes for continuous improvement planning. Moreover, the absence of automation, and integration in QA processes forms a major obstacle towards developing efficient quality system. There is a pressing need to adopt security protocols that provide required security services to safeguard the valuable information processed by QAS as well.… More >

  • Open Access

    ARTICLE

    Design of an Information Security Service for Medical Artificial Intelligence

    Yanghoon Kim1, Jawon Kim2, Hangbae Chang3,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 679-694, 2022, DOI:10.32604/cmc.2022.015610 - 07 September 2021

    Abstract The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliable services focused on security internalization, it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment information in medical artificial More >

  • Open Access

    ARTICLE

    Vibration-Based Pattern Password Approach for Visually Impaired People

    Suliman A. Alsuhibany*

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 341-356, 2022, DOI:10.32604/csse.2022.018563 - 26 August 2021

    Abstract The pattern password method is amongst the most attractive authentication methods and involves drawing a pattern; this is seen as easier than typing a password. However, since people with visual impairments have been increasing their usage of smart devices, this method is inaccessible for them as it requires them to select points on the touch screen. Therefore, this paper exploits the haptic technology by introducing a vibration-based pattern password approach in which the vibration feedback plays an important role. This approach allows visually impaired people to use a pattern password through two developed vibration feedback: More >

  • Open Access

    ARTICLE

    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Hind A. Alshambri1,* Fawaz Alassery2

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112 - 17 November 2021

    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of… More >

  • Open Access

    ARTICLE

    New Quantum Private Comparison Using Hyperentangled GHZ State

    Jerrel Gianni1, Zhiguo Qu2,*

    Journal of Quantum Computing, Vol.3, No.2, pp. 45-54, 2021, DOI:10.32604/jqc.2021.019675 - 22 June 2021

    Abstract In this paper, we propose a new protocol designed for quantum private comparison (QPC). This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party (TP) to achieve the objective. This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom (DOF), which could have 64 combinations. The TP can decide which combination to use based on the shared key information provided from a quantum key distribution (QKD) protocol. By doing so, the security of the protocol can be improved further. Decoy photon technology is also More >

Displaying 21-30 on page 3 of 45. Per Page