Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (69)
  • Open Access

    ARTICLE

    A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications

    Wael Said1, Elsayed Mostafa1,*, M. M. Hassan1, Ayman Mohamed Mostafa2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3193-3209, 2022, DOI:10.32604/cmc.2022.023554 - 07 December 2021

    Abstract User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment. The data stored on the public cloud will be vulnerable to outside and inside attacks. This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud. Different access control policies are applied for verifying users on the… More >

  • Open Access

    ARTICLE

    Convolutional Neural Network-Based Identity Recognition Using ECG at Different Water Temperatures During Bathing

    Jianbo Xu, Wenxi Chen*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1807-1819, 2022, DOI:10.32604/cmc.2022.021154 - 03 November 2021

    Abstract This study proposes a convolutional neural network (CNN)-based identity recognition scheme using electrocardiogram (ECG) at different water temperatures (WTs) during bathing, aiming to explore the impact of ECG length on the recognition rate. ECG data was collected using non-contact electrodes at five different WTs during bathing. Ten young student subjects (seven men and three women) participated in data collection. Three ECG recordings were collected at each preset bathtub WT for each subject. Each recording is 18 min long, with a sampling rate of 200 Hz. In total, 150 ECG recordings and 150 WT recordings were… More >

  • Open Access

    Preserving Privacy of User Identity Based on Pseudonym Variable in 5G

    Mamoon M. Saeed1, Mohammad Kamrul Hasan2,*, Rosilah Hassan2 , Rania Mokhtar3 , Rashid A. Saeed3,4, Elsadig Saeid1, Manoj Gupta5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5551-5568, 2022, DOI:10.32604/cmc.2022.017338 - 11 October 2021

    Abstract

    The fifth generation (5G) system is the forthcoming generation of the mobile communication system. It has numerous additional features and offers an extensively high data rate, more capacity, and low latency. However, these features and applications have many problems and issues in terms of security, which has become a great challenge in the telecommunication industry. This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity, which randomly changes and does not use the permanent identity between the user

    More >

  • Open Access

    ARTICLE

    Identity Governance Framework for Privileged Users

    Mansour Hammoud Alruwies1, Shailendra Mishra2,*, Mohammed Abdul Rahman AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 995-1005, 2022, DOI:10.32604/csse.2022.019355 - 24 September 2021

    Abstract Information technology companies have grown in size and recognized the need to protect their valuable assets. As a result, each IT application has its authentication mechanism, and an employee needs a username and password. As the number of applications increased, as a result, it became increasingly complex to manage all identities like the number of usernames and passwords of an employee. All identities had to be retrieved by users. Both the identities and the access rights associated with those identities had to be protected by an administrator. Management couldn’t even capture such access rights because… More >

  • Open Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657 - 24 September 2021

    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of… More >

  • Open Access

    ARTICLE

    An improved CRNN for Vietnamese Identity Card Information Recognition

    Trinh Tan Dat1, Le Tran Anh Dang1,2, Nguyen Nhat Truong1,2, Pham Cung Le Thien Vu1, Vu Ngoc Thanh Sang1, Pham Thi Vuong1, Pham The Bao1,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 539-555, 2022, DOI:10.32604/csse.2022.019064 - 09 September 2021

    Abstract This paper proposes an enhancement of an automatic text recognition system for extracting information from the front side of the Vietnamese citizen identity (CID) card. First, we apply Mask-RCNN to segment and align the CID card from the background. Next, we present two approaches to detect the CID card’s text lines using traditional image processing techniques compared to the EAST detector. Finally, we introduce a new end-to-end Convolutional Recurrent Neural Network (CRNN) model based on a combination of Connectionist Temporal Classification (CTC) and attention mechanism for Vietnamese text recognition by jointly train the CTC and… More >

  • Open Access

    ARTICLE

    Neutrosophic Rule-Based Identity Verification System Based on Handwritten Dynamic Signature Analysis

    Amr Hefny1, Aboul Ella Hassanien2, Sameh H. Basha1,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2367-2386, 2021, DOI:10.32604/cmc.2021.018017 - 21 July 2021

    Abstract Identity verification using authenticity evaluation of handwritten signatures is an important issue. There have been several approaches for the verification of signatures using dynamics of the signing process. Most of these approaches extract only global characteristics. With the aim of capturing both dynamic global and local features, this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system (NRVS) and Genetic NRVS (GNRVS) models. The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values: truth, indeterminacy, and falsity. These three values More >

  • Open Access

    ARTICLE

    Pseudonym Mutable Based Privacy for 5G User Identity

    Rashid A. Saeed1, Mamoon M. Saeed2,3, Rania A. Mokhtar1, Hesham Alhumyani1, S. Abdel-Khalek4,*

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 1-14, 2021, DOI:10.32604/csse.2021.015593 - 10 June 2021

    Abstract Privacy, identity preserving and integrity have become key problems for telecommunication standards. Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed. As Internet of Things (IoT) and long-term evolution for machine type (LTE-m) are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase. For all the above issues standards’ bodies should ensure users’ identity and privacy in order to gain the trust of service providers and industries. Against such threats, 5G specifications require a rigid and robust privacy procedure.… More >

  • Open Access

    ARTICLE

    An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment

    K. Raju*, M. Chinnadurai

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1057-1072, 2021, DOI:10.32604/cmc.2021.016068 - 04 June 2021

    Abstract Security is a critical issue in cloud computing (CC) because attackers can fabricate data by creating, copying, or deleting data with no user authorization. Most of the existing techniques make use of password-based authentication for encrypting data. Password-based schemes suffer from several issues and can be easily compromised. This paper presents a new concept of hybrid metaheuristic optimization as an identity-based secure and optimal authentication (HMO-ISOA) scheme for CC environments. The HMO-ISOA technique makes use of iris and fingerprint biometrics. Initially, the HMO-ISOA technique involves a directional local ternary quantized extrema pattern–based feature extraction process… More >

  • Open Access

    ARTICLE

    UFC-Net with Fully-Connected Layers and Hadamard Identity Skip Connection for Image Inpainting

    Chung-Il Kim1, Jehyeok Rew2, Yongjang Cho2, Eenjun Hwang2,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3447-3463, 2021, DOI:10.32604/cmc.2021.017633 - 06 May 2021

    Abstract Image inpainting is an interesting technique in computer vision and artificial intelligence for plausibly filling in blank areas of an image by referring to their surrounding areas. Although its performance has been improved significantly using diverse convolutional neural network (CNN)-based models, these models have difficulty filling in some erased areas due to the kernel size of the CNN. If the kernel size is too narrow for the blank area, the models cannot consider the entire surrounding area, only partial areas or none at all. This issue leads to typical problems of inpainting, such as pixel More >

Displaying 41-50 on page 5 of 69. Per Page