Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (283)
  • Open Access

    ARTICLE

    Atmospheric Convection Model Based Digital Confidentiality Scheme

    Noor Munir1, Majid Khan1,*, Mohammad Mazyad Hazzazi2, Amer Aljaedi3, Sajjad Shaukat Jamal2, Iqtadar Hussain4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4503-4522, 2022, DOI:10.32604/cmc.2022.021077 - 14 January 2022

    Abstract Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally. The combination of different innovative topics of information security and high-speed computing has added new visions into the behavior of complex nonlinear dynamical systems which uncovered amazing results even in the least difficult nonlinear models. The generation of complex actions from a very simple dynamical method has a strong relation with information security. The protection of digital content is one of the inescapable concerns of the digitally advanced world. Today, information plays an important… More >

  • Open Access

    ARTICLE

    Lightweight Direct Acyclic Graph Blockchain for Enhancing Resource-Constrained IoT Environment

    Salaheddine Kably1,2,*, Mounir Arioua1, Nabih Alaoui2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5271-5291, 2022, DOI:10.32604/cmc.2022.020833 - 14 January 2022

    Abstract Blockchain technology is regarded as the emergent security solution for many applications related to the Internet of Things (IoT). In concept, blockchain has a linear structure that grows with the number of transactions entered. This growth in size is the main obstacle to the blockchain, which makes it unsuitable for resource-constrained IoT environments. Moreover, conventional consensus algorithms such as PoW, PoS are very computationally heavy. This paper solves these problems by introducing a new lightweight blockchain structure and lightweight consensus algorithm. The Multi-Zone Direct Acyclic Graph (DAG) Blockchain (Multizone-DAG-Blockchain) framework is proposed for the fog-based IoT… More >

  • Open Access

    ARTICLE

    Light-Weight Present Block Cipher Model for IoT Security on FPGA

    R. Bharathi*, N. Parvatham

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 35-49, 2022, DOI:10.32604/iasc.2022.020681 - 05 January 2022

    Abstract The Internet of Things (IoT) plays an essential role in connecting a small number of billion devices with people for diverse applications. The security and privacy with authentication are challenging work for IoT devices. A light-weight block cipher is designed and modeled with IoT security for real-time scenarios to overcome the above challenges. The light-weight PRESENT module with the integration of encryption (E)-decryption (D) is modeled and implemented on FPGA. The PRESENT module has 64-bit data input with 80/128/256-bit symmetric keys for IoT security. The PRESENT module performs16/32/64 round operations for state register and key… More >

  • Open Access

    ARTICLE

    User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains

    S. Godfrey Winster1, A. Siva Kumar2,*, R. Ramesh3

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 605-618, 2022, DOI:10.32604/csse.2022.022467 - 04 January 2022

    Abstract Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner. The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation (RMI). The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user. Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service. To improve the performance in… More >

  • Open Access

    ARTICLE

    A Secure Encrypted Classified Electronic Healthcare Data for Public Cloud Environment

    Kirupa Shankar Komathi Maathavan1,*, Santhi Venkatraman2

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 765-779, 2022, DOI:10.32604/iasc.2022.022276 - 17 November 2021

    Abstract The major operation of the blood bank supply chain is to estimate the demand, perform inventory management and distribute adequate blood for the needs. The proliferation of big data in the blood bank supply chain and data management needs an intelligent, automated system to classify the essential data so that the requests can be handled easily with less human intervention. Big data in the blood bank domain refers to the collection, organization, and analysis of large volumes of data to obtain useful information. For this purpose, in this research work we have employed machine learning… More >

  • Open Access

    ARTICLE

    Cost Effective Decentralized Key Management Framework for IoT

    Raja Lavanya*, K. Sundarakantham, S. Mercy Shalinie

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1057-1070, 2022, DOI:10.32604/csse.2022.021052 - 10 November 2021

    Abstract Security is a primary concern in communication for reliable transfer of information between the authenticated members, which becomes more complex in a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique with Multicast and Unicast key management protocol (BMU-IOT) for decentralized networks has been proposed. The first part of the proposed work is to divide the network into clusters where sensors are connected to and is administered by cluster head. Each sensor securely shares its secret keys with the cluster head using unicast. Based More >

  • Open Access

    Fed-DFE: A Decentralized Function Encryption-Based Privacy-Preserving Scheme for Federated Learning

    Zhe Sun1, Jiyuan Feng1, Lihua Yin1,*, Zixu Zhang2, Ran Li1, Yu Hu1, Chongning Na3

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1867-1886, 2022, DOI:10.32604/cmc.2022.022290 - 03 November 2021

    Abstract Federated learning is a distributed learning framework which trains global models by passing model parameters instead of raw data. However, the training mechanism for passing model parameters is still threatened by gradient inversion, inference attacks, etc. With a lightweight encryption overhead, function encryption is a viable secure aggregation technique in federation learning, which is often used in combination with differential privacy. The function encryption in federal learning still has the following problems: a) Traditional function encryption usually requires a trust third party (TTP) to assign the keys. If a TTP colludes with a server, the… More >

  • Open Access

    ARTICLE

    Novel Image Encryption and Compression Scheme for IoT Environment

    Mesfer Al Duhayyim1, Fahd N. Al-Wesabi2, Radwa Marzouk3, Manar Ahmed Hamza4, Anwer Mustafa Hilal4,*, Majdy M. Eltahir2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1443-1457, 2022, DOI:10.32604/cmc.2022.021873 - 03 November 2021

    Abstract Latest advancements made in the processing abilities of smart devices have resulted in the designing of Intelligent Internet of Things (IoT) environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assisted environment since it contains visual sensors that examine the surroundings from a number of overlapping views by capturing the images incessantly. Since IoT devices generate a massive quantity of digital media, it is therefore required to save the media, especially images, in a secure way.… More >

  • Open Access

    ARTICLE

    Dynamic Encryption and Secure Transmission of Terminal Data Files

    Ruchun Jia1,*, Yang Xin2, Bo Liu3, Qin Qin4

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1221-1232, 2022, DOI:10.32604/cmc.2022.019318 - 03 November 2021

    Abstract Data is the last defense line of security, in order to prevent data loss, no matter where the data is stored, copied or transmitted, it is necessary to accurately detect the data type, and further clarify the form and encryption structure of the data transmission process to ensure the accuracy of the data, so as to prevent data leakage, take the data characteristics as the core, use transparent encryption and decryption technology as the leading, and According to the data element characteristics such as identity authentication, authority management, outgoing management, file audit and external device… More >

  • Open Access

    ARTICLE

    Intelligent Chimp Metaheuristics Optimization with Data Encryption Protocol for WSN

    P. Manjula1,*, Dr. S. Baghavathi Priya2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 573-587, 2022, DOI:10.32604/iasc.2022.020969 - 26 October 2021

    Abstract Recent developments in low power electronic devices integrated into wireless communication technologies resulted in the domain of wireless sensor networks (WSN), which finds in applications in diverse data gathering and tracking applications. Since WSN is mostly deployed in harsh and inaccessible environments, it is necessary to design energy efficient and security solutions. The clustering technique is an effective way to lengthen the lifetime of WSN. But most of the clustering techniques elect cluster heads (CHs) irrespective of clusters. To resolve this issue, this paper presents a new intelligent metaheuristics based energy aware clustering with data… More >

Displaying 191-200 on page 20 of 283. Per Page