Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (69)
  • Open Access

    ARTICLE

    Phishing Scam Detection on Ethereum via Mining Trading Information

    Yanyu Chen1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.4, No.3, pp. 189-200, 2022, DOI:10.32604/jcs.2022.038401 - 01 February 2023

    Abstract As a typical representative of web 2.0, Ethereum has significantly boosted the development of blockchain finance. However, due to the anonymity and financial attributes of Ethereum, the number of phishing scams is increasing rapidly and causing massive losses, which poses a serious threat to blockchain financial security. Phishing scam address identification enables to detect phishing scam addresses and alerts users to reduce losses. However, there are three primary challenges in phishing scam address recognition task: 1) the lack of publicly available large datasets of phishing scam address transactions; 2) the use of multi-order transaction information… More >

  • Open Access

    ARTICLE

    Partial Bell Polynomials, Falling and Rising Factorials, Stirling Numbers, and Combinatorial Identities

    Siqintuya Jin1, Bai-Ni Guo2,*, Feng Qi3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 781-799, 2022, DOI:10.32604/cmes.2022.019941 - 27 June 2022

    Abstract In the paper, the authors collect, discuss, and find out several connections, equivalences, closed-form formulas, and combinatorial identities concerning partial Bell polynomials, falling factorials, rising factorials, extended binomial coefficients, and the Stirling numbers of the first and second kinds. These results are new, interesting, important, useful, and applicable in combinatorial number theory. More >

  • Open Access

    ARTICLE

    College Students’ Academic Stressors on Mental Health during the COVID-19 Pandemic: A Comparison between Graduating Students and Non-Graduating Students

    Jiaqi Yang1, Yanwen Zhang2, Peng Li2,3,4, Huan Zhang2,3,4, Tour Liu2,3,4,*

    International Journal of Mental Health Promotion, Vol.24, No.4, pp. 603-618, 2022, DOI:10.32604/ijmhp.2022.019406 - 27 May 2022

    Abstract The study aimed to investigate the influence of academic stressors on mental health and the mediating effect of social support and self-identity among college students and further studied the difference between the graduating students and non-graduating students during the COVID-19 Pandemic. Recruiting 900 college students as subjects, used the college students’ academic stressors questionnaire, social support questionnaire, self-identity scale and depression anxiety stress scales (DASS-21). The results showed that: (1) The college students’ academic stressor positively predicted mental health; (2) Social support and self-identity mediated the relationship; (3) The model also held when academic stressors More >

  • Open Access

    ARTICLE

    Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

    A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1693-1706, 2022, DOI:10.32604/iasc.2022.024714 - 25 May 2022

    Abstract In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based… More >

  • Open Access

    ARTICLE

    FPGA Implementation of 5G NR Primary and Secondary Synchronization

    Aytha Ramesh Kumar1,*, K. Lal Kishore2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1585-1600, 2022, DOI:10.32604/cmc.2022.021573 - 18 May 2022

    Abstract The 5G communication systems are widely established for high-speed data processing to meet users demands. The 5G New Radio (NR) communications comprise a network of ultra-low latency, high processing speeds, high throughput and rapid synchronization with a time frame of 10 ms. Synchronization between User Equipment (UE) and 5G base station known as gNB is a fundamental procedure in a cellular system and it is performed by a synchronization signal. In 5G NR system, Primary Synchronization Signal (PSS) and Secondary Synchronization Signal (SSS) are used to detect the best serving base station with the help… More >

  • Open Access

    ARTICLE

    Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing

    Amjad Alsirhani, Mohamed Ezz, Ayman Mohamed Mostafa*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 967-984, 2022, DOI:10.32604/csse.2022.024854 - 09 May 2022

    Abstract Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security… More >

  • Open Access

    ARTICLE

    Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

    S. Saravanakumar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508 - 09 May 2022

    Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, More >

  • Open Access

    ARTICLE

    Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System

    Yanan Chen1,2,3,4, Ting Yao1,4,*, Haiping Ren2, Zehao Gan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1497-1513, 2022, DOI:10.32604/cmes.2022.019589 - 19 April 2022

    Abstract The introduction of the electronic medical record (EHR) sharing system has made a great contribution to the management and sharing of healthcare data. Considering referral treatment for patients, the original signature needs to be converted into a re-signature that can be verified by the new organization. Proxy re-signature (PRS) can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data. Unfortunately, the existing PRS schemes cannot realize forward and backward security. Therefore, this paper proposes the first PRS scheme that can provide key-insulated property, which can guarantee both the… More >

  • Open Access

    ARTICLE

    A Novel Method of User Identity Recognition Based on Finger Trajectory

    Xia Zhou1, Zijian Wang2, Tianyu Wang2, Jin Han2,*, Zhiling Wang2, Yannan Qian3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 473-481, 2022, DOI:10.32604/iasc.2022.022493 - 05 January 2022

    Abstract User identity recognition is the key shield to protect users’ privacy data from disclosure and embezzlement. The user identity of mobile devices such as mobile phones mainly includes fingerprint recognition, nine-grid password, face recognition, digital password, etc. Due to the requirements of computing resources and convenience of mobile devices, these verification methods have their own shortcomings. In this paper, a user identity recognition technology based on finger trajectory is proposed. Based on the analysis of the users’ finger trajectory data, the feature of the user's finger movement trajectory is extracted to realize the identification of More >

  • Open Access

    ARTICLE

    Some Formulas Involving Hypergeometric Functions in Four Variables

    Hassen Aydi1,2,3, Ashish Verma4, Jihad Younis5, Jung Rye Lee6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 887-902, 2022, DOI:10.32604/cmes.2022.016924 - 13 December 2021

    Abstract Several (generalized) hypergeometric functions and a variety of their extensions have been presented and investigated in the literature by many authors. In the present paper, we investigate four new hypergeometric functions in four variables and then establish several recursion formulas for these new functions. Also, some interesting particular cases and consequences of our results are discussed. More >

Displaying 31-40 on page 4 of 69. Per Page