Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (523)
  • Open Access

    ARTICLE

    An Improved Blockchain-Based Cloud Auditing Scheme Using Dynamic Aggregate Signatures

    Haibo Lei1,2, Xu An Wang1,*, Wenhao Liu1, Lingling Wu1, Chao Zhang1, Weiwei Jiang3, Xiao Zou4

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.070030 - 09 December 2025

    Abstract With the rapid expansion of the Internet of Things (IoT), user data has experienced exponential growth, leading to increasing concerns about the security and integrity of data stored in the cloud. Traditional schemes relying on untrusted third-party auditors suffer from both security and efficiency issues, while existing decentralized blockchain-based auditing solutions still face shortcomings in correctness and security. This paper proposes an improved blockchain-based cloud auditing scheme, with the following core contributions: Identifying critical logical contradictions in the original scheme, thereby establishing the foundation for the correctness of cloud auditing; Designing an enhanced mechanism that… More >

  • Open Access

    ARTICLE

    Federated Dynamic Aggregation Selection Strategy-Based Multi-Receptive Field Fusion Classification Framework for Point Cloud Classification

    Yuchao Hou1,2, Biaobiao Bai3, Shuai Zhao3, Yue Wang3, Jie Wang3, Zijian Li4,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-30, 2026, DOI:10.32604/cmc.2025.069789 - 09 December 2025

    Abstract Recently, large-scale deep learning models have been increasingly adopted for point cloud classification. However, these methods typically require collecting extensive datasets from multiple clients, which may lead to privacy leaks. Federated learning provides an effective solution to data leakage by eliminating the need for data transmission, relying instead on the exchange of model parameters. However, the uneven distribution of client data can still affect the model’s ability to generalize effectively. To address these challenges, we propose a new framework for point cloud classification called Federated Dynamic Aggregation Selection Strategy-based Multi-Receptive Field Fusion Classification Framework (FDASS-MRFCF).… More >

  • Open Access

    ARTICLE

    Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT

    He Duan, Shi Zhang*, Dayu Li

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069628 - 09 December 2025

    Abstract Internet of Things (IoT) interconnects devices via network protocols to enable intelligent sensing and control. Resource-constrained IoT devices rely on cloud servers for data storage and processing. However, this cloud-assisted architecture faces two critical challenges: the untrusted cloud services and the separation of data ownership from control. Although Attribute-based Searchable Encryption (ABSE) provides fine-grained access control and keyword search over encrypted data, existing schemes lack of error tolerance in exact multi-keyword matching. In this paper, we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search (FCS-ABMSE) scheme that avoids computationally expensive bilinear pairing… More >

  • Open Access

    ARTICLE

    A Multi-Objective Deep Reinforcement Learning Algorithm for Computation Offloading in Internet of Vehicles

    Junjun Ren1, Guoqiang Chen2, Zheng-Yi Chai3, Dong Yuan4,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.068795 - 10 November 2025

    Abstract Vehicle Edge Computing (VEC) and Cloud Computing (CC) significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit (RSU), thereby achieving lower delay and energy consumption. However, due to the limited storage capacity and energy budget of RSUs, it is challenging to meet the demands of the highly dynamic Internet of Vehicles (IoV) environment. Therefore, determining reasonable service caching and computation offloading strategies is crucial. To address this, this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading. By… More >

  • Open Access

    REVIEW

    Attribute-Based Encryption for IoT Environments—A Critical Survey

    Daskshnamoorthy Manivannan*

    Journal on Internet of Things, Vol.7, pp. 71-97, 2025, DOI:10.32604/jiot.2025.072809 - 24 December 2025

    Abstract Attribute-Based Encryption (ABE) secures data by tying decryption rights to user attributes instead of identities, enabling fine-grained access control. However, many ABE schemes are unsuitable for Internet of Things (IoT) due to limited device resources. This paper critically surveys ABE schemes developed specifically for IoT over the past decade, examining their evolution, strengths, limitations, and access control capabilities. It provides insights into their security, effectiveness, and real-world applicability, highlights the current state of ABE in securing IoT data and access, and discusses remaining challenges and open issues. More >

  • Open Access

    ARTICLE

    Attribute-Based Encryption for Secure Access Control in Personal Health Records

    Dakshnamoorthy Manivannan*

    Computer Systems Science and Engineering, Vol.49, pp. 533-555, 2025, DOI:10.32604/csse.2025.072267 - 08 December 2025

    Abstract Attribute-based Encryption (ABE) enhances the confidentiality of Electronic Health Records (EHR) (also known as Personal Health Records (PHR)) by binding access rights not to individual identities, but to user attribute sets such as roles, specialties, or certifications. This data-centric cryptographic paradigm enables highly fine-grained, policy-driven access control, minimizing the need for identity management and supporting scalable multi-user scenarios. This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade. It explores the evolution of these schemes, analyzing their design principles, strengths, limitations, and the level of More >

  • Open Access

    REVIEW

    Attribute-Based Encryption Methods That Support Searchable Encryption

    Daskshnamoorthy Manivannan*

    Journal of Cyber Security, Vol.7, pp. 505-531, 2025, DOI:10.32604/jcs.2025.072810 - 28 November 2025

    Abstract Attribute-Based Encryption (ABE) secures data by linking decryption rights to user attributes rather than user identities, enabling fine-grained access control. While ABE is effective for enforcing access policies, integrating it with Searchable Encryption (SE)—which allows searching encrypted data without decryption—remains a complex challenge. This paper presents a comprehensive survey of ABE schemes that support SE proposed over the past decade. It critically analyzes their strengths, limitations, and access control capabilities. The survey offers insights into the security, efficiency, and practical applicability of these schemes, outlines the current landscape of ABE-integrated SE, and identifies key challenges More >

  • Open Access

    ARTICLE

    Enhancing Roaming Security in Cloud-Native 5G Core Network through Deep Learning-Based Intrusion Detection System

    I Wayan Adi Juliawan Pawana1,2, Vincent Abella2, Jhury Kevin Lastre2, Yongho Ko2, Ilsun You2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2733-2760, 2025, DOI:10.32604/cmes.2025.072611 - 26 November 2025

    Abstract Roaming in 5G networks enables seamless global mobility but also introduces significant security risks due to legacy protocol dependencies, uneven Security Edge Protection Proxy (SEPP) deployment, and the dynamic nature of inter-Public Land Mobile Network (inter-PLMN) signaling. Traditional rule-based defenses are inadequate for protecting cloud-native 5G core networks, particularly as roaming expands into enterprise and Internet of Things (IoT) domains. This work addresses these challenges by designing a scalable 5G Standalone testbed, generating the first intrusion detection dataset specifically tailored to roaming threats, and proposing a deep learning based intrusion detection framework for cloud-native environments.… More > Graphic Abstract

    Enhancing Roaming Security in Cloud-Native 5G Core Network through Deep Learning-Based Intrusion Detection System

  • Open Access

    ARTICLE

    Priority-Based Scheduling and Orchestration in Edge-Cloud Computing: A Deep Reinforcement Learning-Enhanced Concurrency Control Approach

    Mohammad A Al Khaldy1, Ahmad Nabot2, Ahmad Al-Qerem3,*, Mohammad Alauthman4, Amina Salhi5,*, Suhaila Abuowaida6, Naceur Chihaoui7

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 673-697, 2025, DOI:10.32604/cmes.2025.070004 - 30 October 2025

    Abstract The exponential growth of Internet of Things (IoT) devices has created unprecedented challenges in data processing and resource management for time-critical applications. Traditional cloud computing paradigms cannot meet the stringent latency requirements of modern IoT systems, while pure edge computing faces resource constraints that limit processing capabilities. This paper addresses these challenges by proposing a novel Deep Reinforcement Learning (DRL)-enhanced priority-based scheduling framework for hybrid edge-cloud computing environments. Our approach integrates adaptive priority assignment with a two-level concurrency control protocol that ensures both optimal performance and data consistency. The framework introduces three key innovations: (1)… More >

  • Open Access

    ARTICLE

    Three-Dimensional Trajectory Planning for Robotic Manipulators Using Model Predictive Control and Point Cloud Optimization

    Zeinel Momynkulov1,2, Azhar Tursynova1,2,*, Olzhas Olzhayev1,2, Akhanseri Ikramov1,2, Sayat Ibrayev1, Batyrkhan Omarov1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 891-918, 2025, DOI:10.32604/cmes.2025.068615 - 30 October 2025

    Abstract Robotic manipulators increasingly operate in complex three-dimensional workspaces where accuracy and strict limits on position, velocity, and acceleration must be satisfied. Conventional geometric planners emphasize path smoothness but often ignore dynamic feasibility, motivating control-aware trajectory generation. This study presents a novel model predictive control (MPC) framework for three-dimensional trajectory planning of robotic manipulators that integrates second-order dynamic modeling and multi-objective parameter optimization. Unlike conventional interpolation techniques such as cubic splines, B-splines, and linear interpolation, which neglect physical constraints and system dynamics, the proposed method generates dynamically feasible trajectories by directly optimizing over acceleration inputs while… More >

Displaying 11-20 on page 2 of 523. Per Page