Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    Ripple+: An Improved Scheme of Ripple Consensus Protocol in Deployability, Liveness and Timing Assumption

    Chuanwang Ma1,*, Yu Zhang1,2, Binxing Fang1,2, Hongli Zhang1, Yidong Jin3, Dasheng Zhou3

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 463-481, 2022, DOI:10.32604/cmes.2022.016838

    Abstract Ripple acts as a real-time settlement and payment system to connect banks and payment providers. As the consensus support of the Ripple network to ensure network consistency, Ripple consensus protocol has been widely concerned in recent years. Compared with those Byzantine fault tolerant protocols, Ripple has a significant difference that the system can reach an agreement under decentralized trust model. However, Ripple has many problems both in theory and practice, which are mentioned in the previous researches. This paper presents Ripple+, an improved scheme of Ripple consensus protocol, which improves Ripple from three aspects: (1) Ripple+ employs a specific trust… More >

  • Open Access

    ARTICLE

    Cost Effective Decentralized Key Management Framework for IoT

    Raja Lavanya*, K. Sundarakantham, S. Mercy Shalinie

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1057-1070, 2022, DOI:10.32604/csse.2022.021052

    Abstract Security is a primary concern in communication for reliable transfer of information between the authenticated members, which becomes more complex in a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique with Multicast and Unicast key management protocol (BMU-IOT) for decentralized networks has been proposed. The first part of the proposed work is to divide the network into clusters where sensors are connected to and is administered by cluster head. Each sensor securely shares its secret keys with the cluster head using unicast. Based on these decryption keys, the… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Reputation Management System for Internet of Everything in 6G-Enabled Cybertwin Architecture

    Meimin Wang, Zhili Zhou*, Chun Ding

    Journal of New Media, Vol.3, No.4, pp. 137-150, 2021, DOI:10.32604/jnm.2021.024543

    Abstract Internet of Everything (IoE) has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet, and it can be widely applied in the fields of industry, transportation, commerce, and education. Recently, the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm. However, the IoE has three open issues in the 6G-enabled cybertwin architecture, i.e., data authenticity, data storage and node reliability. To address these issues, we propose a blockchain-based decentralized reputation management system (BC-DRMS) for IoE in 6G-enabled Cybertwin architecture.… More >

  • Open Access

    Fed-DFE: A Decentralized Function Encryption-Based Privacy-Preserving Scheme for Federated Learning

    Zhe Sun1, Jiyuan Feng1, Lihua Yin1,*, Zixu Zhang2, Ran Li1, Yu Hu1, Chongning Na3

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1867-1886, 2022, DOI:10.32604/cmc.2022.022290

    Abstract Federated learning is a distributed learning framework which trains global models by passing model parameters instead of raw data. However, the training mechanism for passing model parameters is still threatened by gradient inversion, inference attacks, etc. With a lightweight encryption overhead, function encryption is a viable secure aggregation technique in federation learning, which is often used in combination with differential privacy. The function encryption in federal learning still has the following problems: a) Traditional function encryption usually requires a trust third party (TTP) to assign the keys. If a TTP colludes with a server, the security aggregation mechanism can be… More >

  • Open Access

    ARTICLE

    Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication

    Mustafa Kara1,*, Muhammed Ali Aydın1,2, Hasan Hüseyin Balık1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1901-1918, 2022, DOI:10.32604/iasc.2022.021309

    Abstract Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they carry out conversations over the Internet, which is an electronic communication line, and its security has always been largely a matter of concern. Authentication of the caller is the first line of defense among the security principles and is an important principle to provide security in VoIP application. Authentication methods in VoIP applications are usually based on trusted third parties or through centralized architecture. This situation creates problems in terms of single point of failure and privacy in call security over IP based communications. However, blockchain technology… More >

  • Open Access

    ARTICLE

    Using Blockchain Technology in Mobile Network to create decentralized Home Location Registry (HLR)

    Behnam Kiani Kalejahi1,2,*, Ruslan Eminov1, Aga Guliyev1

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 287-296, 2021, DOI:10.32604/csse.2021.05480

    Abstract Blockchain can mean many things to many people. It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers. It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies. For technologists, it is the driving force behind the next generation of the internet. On the other hand, it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people, a tool for radically reshaping society and economy. Some view it as a disruptive technology that… More >

  • Open Access

    ARTICLE

    Internet of Things: Protection of Medical Data through Decentralized Ledgers

    Abdalla Alameen*

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 593-602, 2021, DOI:10.32604/iasc.2021.016950

    Abstract It is forecasted that billions of Internet of Things (IoT) and sensor devices will be installed worldwide by 2020. These devices can provide infrastructure-based services for various applications such as in smart hospitals, smart industry, smart grids, and smart industrial towns. Among them, the hospital service system needs to authenticate devices, and medical data are recorded for diagnostic purposes. In general, digital signatures are employed, but the computational power and their huge numbers pose many challenges to the digital signature system. To solve such problems, we developed a ledger system for authenticating IoT medical devices. It is a centralized ledger… More >

  • Open Access

    ARTICLE

    Design and Optimization of a Hybrid Energy System for Decentralized Heating

    Ling Cheng1,2,3,*, Bingqing Guo1,2, Kecheng Li1,2

    FDMP-Fluid Dynamics & Materials Processing, Vol.17, No.1, pp. 49-70, 2021, DOI:10.32604/fdmp.2021.011062

    Abstract The performances of a hybrid energy system for decentralized heating are investigated. The proposed energy system consists of a solar collector, an air-source heat pump, a gas-fired boiler and a hot water tank. A mathematical model is developed to predict the operating characteristics of the system. The simulation results are compared with experimental data. Such a comparison indicates that the model accuracy is sufficient. The influence of the flat plate solar collector area on the economic and energy efficiency of such system is also evaluated through numerical simulations. Finally, this system is optimized using the method of orthogonal design. The… More >

  • Open Access

    ARTICLE

    An Enhanced Decentralized Virtual Machine Migration Approach for Energy-Aware Cloud Data Centers

    R. Jayamala*, A. Valarmathi

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 347-358, 2021, DOI:10.32604/iasc.2021.012401

    Abstract Cloud computing is an increasingly important technology to deliver pay-as-you-go online computing services. In this study, the cloud service provider permits the cloud user to pay according to the user’s needs. Various methods have been used to reduce energy utilization in the cloud. The rapid increase of cloud users has led to increased energy consumption and higher operating costs for cloud providers. A key issue in cloud data centers is their massive energy consumption to operate and maintain computing services. Virtual machine (VM) migration is a method to reduce energy consumption. This study proposes enhanced decentralized virtual machine migration (EDVMM),… More >

  • Open Access

    ARTICLE

    Real Estate Management via a Decentralized Blockchain Platform

    Iftikhar Ahmad1,*, Mohammed A. Alqarni2, Abdulwahab Ali Almazroi3, Laiba Alam1

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1813-1822, 2021, DOI:10.32604/cmc.2020.013048

    Abstract Blockchain technology is one of the key technological breakthroughs of the last decade. It has the ability to revolutionize numerous aspects of society, including financial systems, healthcare, e-government and many others. One such area that is able to reap the benefits of blockchain technology is the real estate industry. Like many other industries, real estate faces major administrative problems such as high transaction fees, a lack of transparency, fraud and the effects of a middleman including undue influence and commissions. Blockchain enables supporting technologies to overcome the obstacles inherent within the real estate investment market. These technologies include smart contracts,… More >

Displaying 11-20 on page 2 of 23. Per Page