Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (231)
  • Open Access

    ARTICLE

    Hybrid Dynamic Optimization for Multilevel Security System in Disseminating Confidential Information

    Shahina Anwarul1, Sunil Kumar2, Ashok Bhansali3, Hammam Alshazly4,*, Hany S. Hussein5,6

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3145-3163, 2023, DOI:10.32604/csse.2023.041061

    Abstract Security systems are the need of the hour to protect data from unauthorized access. The dissemination of confidential information over the public network requires a high level of security. The security approach such as steganography ensures confidentiality, authentication, integrity, and non-repudiation. Steganography helps in hiding the secret data inside the cover media so that the attacker can be confused during the transmission process of secret data between sender and receiver. Therefore, we present an efficient hybrid security model that provides multifold security assurance. To this end, a rectified Advanced Encryption Standard (AES) algorithm is proposed to overcome the problems existing… More >

  • Open Access

    ARTICLE

    Computational Intelligence Driven Secure Unmanned Aerial Vehicle Image Classification in Smart City Environment

    Firas Abedi1, Hayder M. A. Ghanimi2, Abeer D. Algarni3, Naglaa F. Soliman3,*, Walid El-Shafai4,5, Ali Hashim Abbas6, Zahraa H. Kareem7, Hussein Muhi Hariz8, Ahmed Alkhayyat9

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3127-3144, 2023, DOI:10.32604/csse.2023.038959

    Abstract Computational intelligence (CI) is a group of nature-simulated computational models and processes for addressing difficult real-life problems. The CI is useful in the UAV domain as it produces efficient, precise, and rapid solutions. Besides, unmanned aerial vehicles (UAV) developed a hot research topic in the smart city environment. Despite the benefits of UAVs, security remains a major challenging issue. In addition, deep learning (DL) enabled image classification is useful for several applications such as land cover classification, smart buildings, etc. This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification (MDLS-UAVIC) model in a smart city environment.… More >

  • Open Access

    ARTICLE

    A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm

    Yazeed Yasin Ghadi1, Mohammed S. Alshehri2, Sultan Almakdi2, Oumaima Saidani3,*, Nazik Alturki3, Fawad Masood4, Muhammad Shahbaz Khan5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 781-797, 2023, DOI:10.32604/cmc.2023.042777

    Abstract Securing digital image data is a key concern in today’s information-driven society. Effective encryption techniques are required to protect sensitive image data, with the Substitution-box (S-box) often playing a pivotal role in many symmetric encryption systems. This study introduces an innovative approach to creating S-boxes for encryption algorithms. The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme. The nonlinearity measure of the proposed S-boxes is 112. These qualities significantly enhance its resistance to common cryptographic attacks, ensuring high image data security. Furthermore, to assess the robustness of the S-boxes, an encryption system… More >

  • Open Access

    ARTICLE

    A Novel Approach for Image Encryption with Chaos-RNA

    Yan Hong1,2, Shihui Fang2,*, Jingming Su2, Wanqiu Xu2, Yuhao Wei2, Juan Wu2, Zhen Yang1,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 139-160, 2023, DOI:10.32604/cmc.2023.043424

    Abstract In today’s information society, image encryption technology is crucial to protecting Internet security. However, traditional image encryption algorithms have problems such as insufficient chaotic characteristics, insufficient randomness of keys, and insecure Ribonucleic Acid (RNA) encoding. To address these issues, a chaos-RNA encryption scheme that combines chaotic maps and RNA encoding was proposed in this research. The initial values and parameters of the chaotic system are first generated using the Secure Hash Algorithm 384 (SHA-384) function and the plaintext image. Next, the Lü hyperchaotic system sequence was introduced to change the image’s pixel values to realize block scrambling, and further disturbance… More > Graphic Abstract

    A Novel Approach for Image Encryption with Chaos-RNA

  • Open Access

    ARTICLE

    A Wrapping Encryption Based on Double Randomness Mechanism

    Yi-Li Huang1, Fang-Yie Leu1,2,*, Ruey-Kai Sheu1, Jung-Chun Liu1, Chi-Jan Huang2,3

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1143-1164, 2023, DOI:10.32604/cmc.2023.037161

    Abstract Currently, data security mainly relies on password (PW) or system channel key (SKCH) to encrypt data before they are sent, no matter whether in broadband networks, the 5th generation (5G) mobile communications, satellite communications, and so on. In these environments, a fixed password or channel key (e.g., PW/SKCH) is often adopted to encrypt different data, resulting in security risks since this PW/SKCH may be solved after hackers collect a huge amount of encrypted data. Actually, the most popularly used security mechanism Advanced Encryption Standard (AES) has its own problems, e.g., several rounds have been solved. On the other hand, if… More >

  • Open Access

    ARTICLE

    Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination

    Peng Liu1, Qian He1,*, Baokang Zhao2, Biao Guo1, Zhongyi Zhai1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3325-3343, 2023, DOI:10.32604/cmc.2023.041167

    Abstract Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT. However, data privacy is potentially risky when data is outsourced to cloud servers or edge services. While data encryption ensures data confidentiality, it can impede data sharing and retrieval. Attribute-based searchable encryption (ABSE) is proposed as an effective technique for enhancing data security and privacy. Nevertheless, ABSE has its limitations, such as single attribute authorization failure, privacy leakage during the search process, and high decryption overhead. This paper presents a novel approach called the blockchain-assisted efficient multi-authority attribute-based… More >

  • Open Access

    ARTICLE

    A Smart Obfuscation Approach to Protect Software in Cloud

    Lei Yu1, Yucong Duan2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3949-3965, 2023, DOI:10.32604/cmc.2023.038970

    Abstract Cloud computing and edge computing brought more software, which also brought a new danger of malicious software attacks. Data synchronization mechanisms of software can further help reverse data modifications. Based on the mechanisms, attackers can cover themselves behind the network and modify data undetected. Related knowledge of software reverse engineering can be organized as rules to accelerate the attacks, when attackers intrude cloud server to access the source or binary codes. Therefore, we proposed a novel method to resist this kind of reverse engineering by breaking these rules. Our method is based on software obfuscations and encryptions to enhance the… More >

  • Open Access

    ARTICLE

    Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution

    Tao Yin1, Changgen Peng2,*, Weijie Tan3, Dequan Xu4, Hanlin Tang5

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 827-843, 2024, DOI:10.32604/cmes.2023.029039

    Abstract In the assessment of car insurance claims, the claim rate for car insurance presents a highly skewed probability distribution, which is typically modeled using Tweedie distribution. The traditional approach to obtaining the Tweedie regression model involves training on a centralized dataset, when the data is provided by multiple parties, training a privacy-preserving Tweedie regression model without exchanging raw data becomes a challenge. To address this issue, this study introduces a novel vertical federated learning-based Tweedie regression algorithm for multi-party auto insurance rate setting in data silos. The algorithm can keep sensitive data locally and uses privacy-preserving techniques to achieve intersection… More >

  • Open Access

    ARTICLE

    Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services

    Jinqiu Hou1, Changgen Peng1,*, Weijie Tan1,2, Hongfa Ding3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 917-938, 2024, DOI:10.32604/cmes.2023.027276

    Abstract Cloud-based services have powerful storage functions and can provide accurate computation. However, the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight. Although the attribute-based proxy re-encryption (ABPRE) schemes based on number theory can solve this problem, it is still difficult to resist quantum attacks and have limited expression capabilities. To address these issues, we present a novel linear secret sharing schemes (LSSS) matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research. Additionally, to detect the activities of illegal proxies, homomorphic signature (HS) technology is… More >

  • Open Access

    ARTICLE

    A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model

    Jawad Ahmad1,*, Mimonah Al Qathrady2, Mohammed S. Alshehri3, Yazeed Yasin Ghadi4, Mujeeb Ur Rehman5, Syed Aziz Shah6

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1325-1341, 2023, DOI:10.32604/cmc.2023.040858

    Abstract Due to the inherent insecure nature of the Internet, it is crucial to ensure the secure transmission of image data over this network. Additionally, given the limitations of computers, it becomes even more important to employ efficient and fast image encryption techniques. While 1D chaotic maps offer a practical approach to real-time image encryption, their limited flexibility and increased vulnerability restrict their practical application. In this research, we have utilized a 3D Hindmarsh-Rose model to construct a secure cryptosystem. The randomness of the chaotic map is assessed through standard analysis. The proposed system enhances security by incorporating an increased number… More >

Displaying 11-20 on page 2 of 231. Per Page