Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (69)
  • Open Access

    ARTICLE

    Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice

    Lin Mei1, Chungen Xu1,*, Lei Xu1, Xiaoling Yu2, Cong Zuo3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2299-2314, 2021, DOI:10.32604/cmc.2021.017216 - 13 April 2021

    Abstract Internet of Things (IoT), which provides the solution of connecting things and devices, has increasingly developed as vital tools to realize intelligent life. Generally, source-limited IoT sensors outsource their data to the cloud, which arises the concerns that the transmission of IoT data is happening without appropriate consideration of the profound security challenges involved. Though encryption technology can guarantee the confidentiality of private data, it hinders the usability of data. Searchable encryption (SE) has been proposed to achieve secure data sharing and searching. However, most of existing SE schemes are designed under conventional hardness assumptions… More >

  • Open Access

    ARTICLE

    A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain

    Xizi Peng1, Jinquan Zhang1,*, Shibin Zhang1, Wunan Wan1, Hao Chen1, Jinyue Xia2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 265-281, 2021, DOI:10.32604/csse.2021.014557 - 01 March 2021

    Abstract In the existing Electronic Health Records (EHRs), the medical information of patients is completely controlled by various medical institutions. As such, patients have no dominant power over their own EHRs. These personal data are not only inconvenient to access and share, but are also prone to cause privacy disclosure. The blockchain technology provides a new development direction in the medical field. Blockchain-based EHRs are characterized by decentralization, openness and non-tampering of records, which enable patients to better manage their own EHRs. In order to better protect the privacy of patients, only designated receivers can access… More >

  • Open Access

    ARTICLE

    A Secure NDN Framework for Internet of Things Enabled Healthcare

    Syed Sajid Ullah1, Saddam Hussain1,*, Abdu Gumaei2,3, Hussain AlSalman2,4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 223-240, 2021, DOI:10.32604/cmc.2021.014413 - 12 January 2021

    Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt… More >

  • Open Access

    ARTICLE

    Security of Chip Bank Card in Remote Payment Based on Risk Feature

    Zheng Fang1,∗, Junyun Cai1, Lifang Tian2

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 299-305, 2020, DOI:10.32604/csse.2020.35.299

    Abstract Payment is a necessary thing in people’s daily life, and the development of the Internet makes it possible that people can shop at home. As for chip bank card, it is an important payment method that has been developed in recent years and plays a key role in remote payment. In this study, firstly, the risk features of chip bank cards were analyzed from the general remote payment scheme. Then, based on the security technology theory, a chip bank card remote payment model using elliptic curve hybrid encryption algorithm and identity authentication technology was constructed. More >

  • Open Access

    ARTICLE

    LSTM Neural Network for Beat Classification in ECG Identity Recognition

    Xin Liu1,*, Yujuan Si1,2, Di Wang1

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 341-351, 2020, DOI:10.31209/2019.100000104

    Abstract As a biological signal existing in the human living body, the electrocardiogram (ECG) contains abundantly personal information and fulfils the basic characteristics of identity recognition. It has been widely used in the field of individual identification research in recent years. The common process of identity recognition includes three steps: ECG signals preprocessing, feature extraction and processing, beat classification recognition. However, the existing ECG classification models are sensitive to limitations of database type and extracted features dimension, which makes classification accuracy difficult to improve and cannot meet the needs of practical applications. To tackle the problem,… More >

  • Open Access

    ARTICLE

    A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies

    Ning Liu1, Fan Yang1, *, Xi Xiong1, 2, Yan Chang1, Shibin Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1559-1570, 2020, DOI:10.32604/cmc.2020.010562 - 20 August 2020

    Abstract Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system. The trust management system evaluates, manages, and shares users’ trust values. The service provider (SP) members of the federation system rely on users’ trust values to determine which type and quality of service will be provided to the users. While identity federation systems have the potential to help federated users save time and energy and improve service experience, the benefits also come with significant privacy risks. So far, there has been little discussion about the privacy protection of… More >

  • Open Access

    ARTICLE

    Key-Private Identity-Based Proxy Re-Encryption

    Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 633-647, 2020, DOI:10.32604/cmc.2020.06217 - 01 May 2020

    Abstract An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private More >

  • Open Access

    ARTICLE

    Complexity Effective Frequency and Sidelink Synchronization Algorithm for LTE Device-to-Device Communication Systems

    Yong-An Jung1, Min-Goo Kang2, Young-Hwan You1, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 443-458, 2020, DOI:10.32604/cmc.2020.08777

    Abstract Device-to-device (D2D) communication is considered as a major challenge in the long term evolution (LTE) network wherein devices directly communicate with each other. One of the key challenges in D2D sidelink is reliable and reduced-complexity synchronization. To address this issue, a computationally efficient sequential detection scheme for integer carrier frequency offset and sidelink identity is proposed in the LTED2D system. To perform the frequency offset detection without retrieving the sidelink identity, the conjugate relation between two primary sidelink synchronization sequences is exploited, which facilitates the detection tasks of frequency offset and sidelink identity to be More >

  • Open Access

    ARTICLE

    The Origin and Identity of the Calyculus in Loranthaceae: Inferred From the Floral Organogenesis of Loranthus tanakae Franch. & Sav.

    Ruozhu Lin1, Bei Cui1,2 and Wenxia Zhao1,*

    Phyton-International Journal of Experimental Botany, Vol.88, No.3, pp. 285-293, 2019, DOI:10.32604/phyton.2019.07182

    Abstract The flowers of the hemiparasitic family Loranthaceae are always subtended by a rimmed structure known as the calyculus. The origin and identity of the calyculus have been disputed for more than a century. Various hypotheses have been proposed, for example, an outgrowth of the axis, a reduced calyx, and a bracteolar (prophyllar) origin, but controversies remain. To obtain a plausible explanation of the origin of the calyculus, we investigated the flowers of Loranthus tanakae using scanning electron microscopy and light microscopy to observe the entire developmental process of the floral parts. Our results show that… More >

  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) More >

Displaying 51-60 on page 6 of 69. Per Page