Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (36)
  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 567-585, 2024, DOI:10.32604/cmc.2024.052233

    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of… More >

  • Open Access

    ARTICLE

    A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts

    Xiaohui Yang, Kun Zhang*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1843-1859, 2024, DOI:10.32604/cmc.2023.047660

    Abstract Data is regarded as a valuable asset, and sharing data is a prerequisite for fully exploiting the value of data. However, the current medical data sharing scheme lacks a fair incentive mechanism, and the authenticity of data cannot be guaranteed, resulting in low enthusiasm of participants. A fair and trusted medical data trading scheme based on smart contracts is proposed, which aims to encourage participants to be honest and improve their enthusiasm for participation. The scheme uses zero-knowledge range proof for trusted verification, verifies the authenticity of the patient’s data and the specific attributes of… More >

  • Open Access

    ARTICLE

    A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain

    Yurong Luo, Wei You*, Chao Shang, Xiongpeng Ren, Jin Cao, Hui Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2237-2260, 2024, DOI:10.32604/cmes.2023.045679

    Abstract The dynamic landscape of the Internet of Things (IoT) is set to revolutionize the pace of interaction among entities, ushering in a proliferation of applications characterized by heightened quality and diversity. Among the pivotal applications within the realm of IoT, as a significant example, the Smart Grid (SG) evolves into intricate networks of energy deployment marked by data integration. This evolution concurrently entails data interchange with other IoT entities. However, there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem. In this paper, we introduce a More >

  • Open Access

    ARTICLE

    Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform

    Xiangmin Guo1,2, Guangjun Liang1,2,*, Jiayin Liu1,2, Xianyi Chen3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3305-3323, 2023, DOI:10.32604/cmc.2023.044529

    Abstract Cloud storage is widely used by large companies to store vast amounts of data and files, offering flexibility, financial savings, and security. However, information shoplifting poses significant threats, potentially leading to poor performance and privacy breaches. Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms, ensuring businesses can focus on business development. To ensure data security in cloud platforms, this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing (HD2C) model. However, the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of… More >

  • Open Access

    ARTICLE

    Chicken Swarm Optimization with Deep Learning Based Packaged Rooftop Units Fault Diagnosis Model

    G. Anitha1, N. Supriya2, Fayadh Alenezi3, E. Laxmi Lydia4, Gyanendra Prasad Joshi5, Jinsang You6,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 221-238, 2023, DOI:10.32604/csse.2023.036479

    Abstract Rooftop units (RTUs) were commonly employed in small commercial buildings that represent that can frequently do not take the higher level maintenance that chillers receive. Fault detection and diagnosis (FDD) tools can be employed for RTU methods to ensure essential faults are addressed promptly. In this aspect, this article presents an Optimal Deep Belief Network based Fault Detection and Classification on Packaged Rooftop Units (ODBNFDC-PRTU) model. The ODBNFDC-PRTU technique considers fault diagnosis as a multi-class classification problem and is handled using DL models. For fault diagnosis in RTUs, the ODBNFDC-PRTU model exploits the deep belief More >

  • Open Access

    ARTICLE

    An Effective Security Comparison Protocol in Cloud Computing

    Yuling Chen1,2, Junhong Tao1, Tao Li1,*, Jiangyuan Cai3, Xiaojun Ren4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5141-5158, 2023, DOI:10.32604/cmc.2023.037783

    Abstract With the development of cloud computing technology, more and more data owners upload their local data to the public cloud server for storage and calculation. While this can save customers’ operating costs, it also poses privacy and security challenges. Such challenges can be solved using secure multi-party computation (SMPC), but this still exposes more security issues. In cloud computing using SMPC, clients need to process their data and submit the processed data to the cloud server, which then performs the calculation and returns the results to each client. Each client and server must be honest.… More >

  • Open Access

    ARTICLE

    In vitro polymerization of the dopamine-borate melanin precursor: A proof-of-concept regarding boron neutron-capture therapy for melanoma

    JUAN C. STOCKERT1,2,*, SILVINA A. ROMERO1, MARCELO N. FELIX-POZZI3, ALFONSO BLÁZQUEZ-CASTRO4

    BIOCELL, Vol.47, No.4, pp. 919-928, 2023, DOI:10.32604/biocell.2023.026631

    Abstract

    The 10boron neutron-capture therapy (BNCT) is an emerging antitumoral method that shows increasing biomedical interest. BNCT is based on the selective accumulation of the 10boron isotope within the tumor, which is then irradiated with low-energy thermal neutrons, generating nuclear fission that produces 7lithium, 4helium, and γ rays. Simple catechol-borate esters have been rather overlooked as precursors of melanin biosynthesis, and therefore, a proof-of-concept approach for using dopamine-borate (DABO) as a suitable boron-containing candidate for potential BNCT is presented here. DABO can spontaneously oxidize and autopolymerize in vitro, giving a soluble, eumelanin-like brown-black poly-DABO product. Melanotic melanoma cell cultures treated

    More >

  • Open Access

    ARTICLE

    Experimental Investigation on the Effect of Seal Presence on the Behavior of Double-Deck Floating Roofs in Cylindrical Steel Storage Tanks

    Alireza Doustvandi, Mehrzad Tahamouli Roudsari*, Behnoush Niazi

    Structural Durability & Health Monitoring, Vol.17, No.1, pp. 55-70, 2023, DOI:10.32604/sdhm.2022.017458

    Abstract Liquid storage, particularly oil and petrochemical products which are considered hazardous liquid, are an important part of the oil industry. Thin-walled vertical cylindrical steel storage tanks are widely used in recent years. Due to high sensitivity of these structures in an earthquake and other external excitations may lead to catastrophic consequences. For instance, huge economic losses, environmental damages, and casualities, many studies have been done about these structures. past studies showed that liquid storage tanks, equipped with a floating roof, are potentially vulnerable while subjected to seismic loads and earthquake has been considered as one… More >

Displaying 1-10 on page 1 of 36. Per Page