Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (166)
  • Open Access

    ARTICLE

    Robust Facial Biometric Authentication System Using Pupillary Light Reflex for Liveness Detection of Facial Images

    Puja S. Prasad1, Adepu Sree Lakshmi1, Sandeep Kautish2, Simar Preet Singh3, Rajesh Kumar Shrivastava3, Abdulaziz S. Almazyad4, Hossam M. Zawbaa5, Ali Wagdy Mohamed6,7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 725-739, 2024, DOI:10.32604/cmes.2023.030640

    Abstract Pupil dynamics are the important characteristics of face spoofing detection. The face recognition system is one of the most used biometrics for authenticating individual identity. The main threats to the facial recognition system are different types of presentation attacks like print attacks, 3D mask attacks, replay attacks, etc. The proposed model uses pupil characteristics for liveness detection during the authentication process. The pupillary light reflex is an involuntary reaction controlling the pupil’s diameter at different light intensities. The proposed framework consists of two-phase methodologies. In the first phase, the pupil’s diameter is calculated by applying stimulus (light) in one eye… More >

  • Open Access

    ARTICLE

    Privacy Enhanced Mobile User Authentication Method Using Motion Sensors

    Chunlin Xiong1,2, Zhengqiu Weng3,4,*, Jia Liu1, Liang Gu2, Fayez Alqahtani5, Amr Gafar6, Pradip Kumar Sharma7

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 3013-3032, 2024, DOI:10.32604/cmes.2023.031088

    Abstract With the development of hardware devices and the upgrading of smartphones, a large number of users save privacy-related information in mobile devices, mainly smartphones, which puts forward higher demands on the protection of mobile users’ privacy information. At present, mobile user authentication methods based on human-computer interaction have been extensively studied due to their advantages of high precision and non-perception, but there are still shortcomings such as low data collection efficiency, untrustworthy participating nodes, and lack of practicability. To this end, this paper proposes a privacy-enhanced mobile user authentication method with motion sensors, which mainly includes: (1) Construct a smart… More >

  • Open Access

    ARTICLE

    Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management

    Lizhe Zhang1,2,*, Yongqiang Huang2, Jia Nie2, Kenian Wang1,2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1467-1488, 2023, DOI:10.32604/cmc.2023.042305

    Abstract System-wide information management (SWIM) is a complex distributed information transfer and sharing system for the next generation of Air Transportation System (ATS). In response to the growing volume of civil aviation air operations, users accessing different authentication domains in the SWIM system have problems with the validity, security, and privacy of SWIM-shared data. In order to solve these problems, this paper proposes a SWIM cross-domain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication. The scheme uses a consistent hash algorithm with virtual nodes in combination with a… More >

  • Open Access

    ARTICLE

    BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks

    Fengting Luo, Ruwei Huang*, Yuyue Chen

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1815-1835, 2023, DOI:10.32604/cmc.2023.041676

    Abstract Smart parks serve as integral components of smart cities, where they play a pivotal role in the process of urban modernization. The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase. To ensure secure communication, device identities must undergo authentication. The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices, making it impractical for resource-constrained devices. This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks, which simplifies the authentication interaction and requires every device to maintain only one certificate. To… More >

  • Open Access

    ARTICLE

    Security Test Case Prioritization through Ant Colony Optimization Algorithm

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Mohd Waris Khan4,*, Mohd Faizan4, Alka Agrawal5, Dhirendra Pandey5

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3165-3195, 2023, DOI:10.32604/csse.2023.040259

    Abstract Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems. One of the challenges in software security testing is test case prioritization, which aims to reduce redundancy in fault occurrences when executing test suites. By effectively applying test case prioritization, both the time and cost required for developing secure software can be reduced. This paper proposes a test case prioritization technique based on the Ant Colony Optimization (ACO) algorithm, a metaheuristic approach. The performance of the ACO-based technique is evaluated using the Average Percentage of Fault… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Robust Morphed Face Authentication Framework for Online Systems

    Harsh Mankodiya1, Priyal Palkhiwala1, Rajesh Gupta1,*, Nilesh Kumar Jadav1, Sudeep Tanwar1, Osama Alfarraj2, Amr Tolba2, Maria Simona Raboaca3,4,*, Verdes Marina5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1123-1142, 2023, DOI:10.32604/cmc.2023.038556

    Abstract The amalgamation of artificial intelligence (AI) with various areas has been in the picture for the past few years. AI has enhanced the functioning of several services, such as accomplishing better budgets, automating multiple tasks, and data-driven decision-making. Conducting hassle-free polling has been one of them. However, at the onset of the coronavirus in 2020, almost all worldly affairs occurred online, and many sectors switched to digital mode. This allows attackers to find security loopholes in digital systems and exploit them for their lucrative business. This paper proposes a three-layered deep learning (DL)-based authentication framework to develop a secure online… More >

  • Open Access

    ARTICLE

    CF-BFT: A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication

    Zhiruo Zhang, Feng Wang*, Yang Liu, Yang Lu, Xinlei Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3113-3129, 2023, DOI:10.32604/cmc.2023.040600

    Abstract The consensus protocol is one of the core technologies in blockchain, which plays a crucial role in ensuring the block generation rate, consistency, and safety of the blockchain system. Blockchain systems mainly adopt the Byzantine Fault Tolerance (BFT) protocol, which often suffers from slow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus. In this paper, this paper proposes a new dual-mode consensus protocol based on node identity authentication. It divides the consensus process into two subprotocols: Check_BFT and Fast_BFT. In Check_BFT, the replicas authenticate the primary’s identity by monitoring its behaviors. First, assume that… More >

  • Open Access

    ARTICLE

    Efficient Remote Identification for Drone Swarms

    Kang-Moon Seo1, Jane Kim1, Soojin Lee1, Jun-Woo Kwon1, Seung-Hyun Seo1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2937-2958, 2023, DOI:10.32604/cmc.2023.039459

    Abstract With the advancement of unmanned aerial vehicle (UAV) technology, the market for drones and the cooperation of many drones are expanding. Drone swarms move together in multiple regions to perform their tasks. A Ground Control Server (GCS) located in each region identifies drone swarm members to prevent unauthorized drones from trespassing. Studies on drone identification have been actively conducted, but existing studies did not consider multiple drone identification environments. Thus, developing a secure and effective identification mechanism for drone swarms is necessary. We suggested a novel approach for the remote identification of drone swarms. For an efficient identification process between… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Information Authentication Scheme for E-Healthcare System

    Naveed Khan1, Jianbiao Zhang1,*, Ghulam Ali Mallah2, Shehzad Ashraf Chaudhry3

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3877-3896, 2023, DOI:10.32604/cmc.2023.032553

    Abstract The mobile cellular network provides internet connectivity for heterogeneous Internet of Things (IoT) devices. The cellular network consists of several towers installed at appropriate locations within a smart city. These cellular towers can be utilized for various tasks, such as e-healthcare systems, smart city surveillance, traffic monitoring, infrastructure surveillance, or sidewalk checking. Security is a primary concern in data broadcasting, particularly authentication, because the strength of a cellular network’s signal is much higher frequency than the associated one, and their frequencies can sometimes be aligned, posing a significant challenge. As a result, that requires attention, and without information authentication, such… More >

  • Open Access

    ARTICLE

    Efficient Group Blind Signature for Medical Data Anonymous Authentication in Blockchain-Enabled IoMT

    Chaoyang Li*, Bohao Jiang, Yanbu Guo, Xiangjun Xin

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 591-606, 2023, DOI:10.32604/cmc.2023.038129

    Abstract Blockchain technology promotes the development of the Internet of medical things (IoMT) from the centralized form to distributed trust mode as blockchain-based Internet of medical things (BIoMT). Although blockchain improves the cross-institution data sharing ability, there still exist the problems of authentication difficulty and privacy leakage. This paper first describes the architecture of the BIoMT system and designs an anonymous authentication model for medical data sharing. This BIoMT system is divided into four layers: perceptual, network, platform, and application. The model integrates an anonymous authentication scheme to guarantee secure data sharing in the network ledger. Utilizing the untampered blockchain ledger… More >

Displaying 11-20 on page 2 of 166. Per Page