Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (68)
  • Open Access

    ARTICLE

    A Decentralized Identity Framework for Secure Federated Learning in Healthcare

    Samuel Acheme*, Glory Nosawaru Edegbe

    Journal of Cyber Security, Vol.8, pp. 1-31, 2026, DOI:10.32604/jcs.2026.073923 - 07 January 2026

    Abstract Federated learning (FL) enables collaborative model training across decentralized datasets, thus maintaining the privacy of training data. However, FL remains vulnerable to malicious actors, posing significant risks in privacy-sensitive domains like healthcare. Previous machine learning trust frameworks, while promising, often rely on resource-intensive blockchain ledgers, introducing computational overhead and metadata leakage risks. To address these limitations, this study presents a novel Decentralized Identity (DID) framework for mutual authentication that establishes verifiable trust among participants in FL without dependence on centralized authorities or high-cost blockchain ledgers. The proposed system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials… More >

  • Open Access

    REVIEW

    From Identification to Obfuscation: A Survey of Cross-Network Mapping and Anti-Mapping Methods

    Shaojie Min1, Yaxiao Luo1, Kebing Liu1, Qingyuan Gong2, Yang Chen1,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.073175 - 09 December 2025

    Abstract User identity linkage (UIL) across online social networks seeks to match accounts belonging to the same real-world individual. This cross-platform mapping enables accurate user modeling but also raises serious privacy risks. Over the past decade, the research community has developed a wide range of UIL methods, from structural embeddings to multimodal fusion architectures. However, corresponding adversarial and defensive approaches remain fragmented and comparatively understudied. In this survey, we provide a unified overview of both mapping and anti-mapping methods for UIL. We categorize representative mapping models by learning paradigm and data modality, and systematically compare them… More >

  • Open Access

    ARTICLE

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    D. Bernal*, O. Ledesma, P. Lamo, J. Bermejo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-39, 2026, DOI:10.32604/cmc.2025.069746 - 10 November 2025

    Abstract This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices,… More >

  • Open Access

    REVIEW

    Understanding Adolescent Social Media Use: A Narrative Review of Motivations, Risk Factors, and Mental Health Implications

    Kyung-Hyun Suh1,*, Sung-Jin Chung1, Goo-Churl Jeong1, Kunho Lee1, Ji-Hyun Ryu2

    International Journal of Mental Health Promotion, Vol.27, No.12, pp. 1829-1845, 2025, DOI:10.32604/ijmhp.2025.071879 - 31 December 2025

    Abstract Background: Adolescents increasingly engage with social media for connection, self-expression, and identity exploration. This growing digital engagement has raised concerns about its potential risks and mental health implications. Methods: This narrative review examines literature on adolescent social media use by exploring underlying motivations, risk and protective factors across personal, environmental, and digital domains, with a focus on mental health outcomes. Results: Individual vulnerabilities—such as low self-esteem, impulsivity, and poor sleep—interact with contextual factors like peer pressure and family conflict to elevate risks. Digital environments shaped by algorithmic feeds, feedback mechanisms, and curated content promote social comparison and More >

  • Open Access

    ARTICLE

    Alienation and Life Satisfaction: Mediation Effects of Social Identity and Hope among University Students

    Shu-Hsuan Chang1, Der-Fa Chen1, Jing-Tang Sie1, Kai-Jie Chen2, Zhe-Wei Liao1, Tai-Lung Chen1, Yao-Chung Cheng3,4,*

    International Journal of Mental Health Promotion, Vol.27, No.12, pp. 1907-1927, 2025, DOI:10.32604/ijmhp.2025.068264 - 31 December 2025

    Abstract Background: Interpersonal alienation has increasingly been recognized as a salient risk factor affecting university students’ psychological adjustment and life satisfaction. Guided by Social Identity and Self-Categorization theories, this study examines how alienation influences life satisfaction through the mediating roles of social identity and hope. Methods: This study surveyed 492 Taiwanese undergraduate students (53.7 percent female, mean age 21.08 years) from 60 universities using convenience sampling in May 2023. Data were collected through an online questionnaire distributed via faculty-managed teaching media platforms. Measures included perceived social identity, state hope, interpersonal alienation, and life satisfaction. All instruments were… More >

  • Open Access

    ARTICLE

    Who I am shapes how I learn: A mixed methods study exploring the role of work identity and psychological needs in learning engagement

    Ling Li1,#, Ninghui Xu1,#, Wenjing Wang2,*, Jianfen Ying1,*

    Journal of Psychology in Africa, Vol.35, No.6, pp. 833-842, 2025, DOI:10.32604/jpa.2025.071557 - 30 December 2025

    Abstract This study explores the role of teachers’ professional identity (TPI) on employee learning engagement (LE), with mediation by basic needs satisfaction (BNS). Participants were 255 Chinese pre-service teachers (191 females = 74.9%, 16 freshmen = 6.2%, 135 sophomores = 52.9%, 35 juniors = 12.5%, 72 seniors = 28.2%). They completed surveys on the “QuestionStar” online survey platform and 12 of the teachers completed interviews for sharing their personal insights. The results of Structural Equation Modeling (SEM) indicated that teachers’ professional identity significantly predicted both learning engagement and basic needs satisfaction, with basic needs satisfaction partially More >

  • Open Access

    ARTICLE

    Implementation and Evaluation of the Zero-Knowledge Protocol for Identity Card Verification

    Edward Danso Ansong*, Simon Bonsu Osei*, Raphael Adjetey Adjei

    Journal of Cyber Security, Vol.7, pp. 533-564, 2025, DOI:10.32604/jcs.2025.061821 - 11 December 2025

    Abstract The surge in identity fraud, driven by the rapid adoption of mobile money, internet banking, and e-services during the COVID-19 pandemic, underscores the need for robust cybersecurity solutions. Zero-Knowledge Proofs (ZKPs) enable secure identity verification by allowing individuals to prove possession of a National ID card without revealing sensitive information. This study implements a ZKP-based identity verification system using Camenisch-Lysyanskaya (CL) signatures, reducing reliance on complex trusted setup ceremonies. While a trusted issuer is still required, as assumed in this work, our approach eliminates the need for broader system-wide trusted parameters. We evaluate the system’s More >

  • Open Access

    ARTICLE

    The effect of technostress on professional identity among online international language teachers: Growth mindset mediation and technical support moderation

    Zhiyong Zhu1, Jinhao Li1, Bo Hu1,*, Hong Chen2

    Journal of Psychology in Africa, Vol.35, No.5, pp. 587-597, 2025, DOI:10.32604/jpa.2025.066359 - 24 October 2025

    Abstract Grounded in the Job Demands-Resources (JD-R) model, this study investigates the relationship between technostress and professional identity among 313 online international language teachers (82.11% female; 77.64% aged 24 and above; 63.87% with postgraduate education). It further examines the mediating role of growth mindset and the moderating effect of technical support. The results indicate that higher levels of technostress are associated with lower levels of professional identity. Growth mindset partially mediates this relationship: elevated technostress not only directly weakens teachers’ professional identity but also indirectly reduces it by undermining their growth mindset. Moreover, technical support significantly More >

  • Open Access

    ARTICLE

    Redefining the Programmer: Human-AI Collaboration, LLMs, and Security in Modern Software Engineering

    Elyson De La Cruz*, Hanh Le, Karthik Meduri, Geeta Sandeep Nadella*, Hari Gonaygunta

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3569-3582, 2025, DOI:10.32604/cmc.2025.068137 - 23 September 2025

    Abstract The rapid integration of artificial intelligence (AI) into software development, driven by large language models (LLMs), is reshaping the role of programmers from traditional coders into strategic collaborators within Industry 4.0 ecosystems. This qualitative study employs a hermeneutic phenomenological approach to explore the lived experiences of Information Technology (IT) professionals as they navigate a dynamic technological landscape marked by intelligent automation, shifting professional identities, and emerging ethical concerns. Findings indicate that developers are actively adapting to AI-augmented environments by engaging in continuous upskilling, prompt engineering, interdisciplinary collaboration, and heightened ethical awareness. However, participants also voiced… More >

  • Open Access

    ARTICLE

    Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi

    Ahmed I. Alutaibi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 875-903, 2025, DOI:10.32604/cmc.2025.067078 - 29 August 2025

    Abstract The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes, particularly in Decentralized Finance (DeFi) systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification. This paper proposes a quantum-resilient, blockchain-based identity verification framework designed to address critical challenges in privacy preservation, scalability, and post-quantum security. The proposed model integrates Post-quantum Cryptography (PQC), specifically lattice-based cryptographic primitives, with Decentralized Identifiers (DIDs) and Zero-knowledge Proofs (ZKPs) to ensure verifiability, anonymity, and resistance to quantum attacks. A dual-layer architecture is introduced, comprising an identity layer for credential generation and validation,… More >

Displaying 1-10 on page 1 of 68. Per Page