Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (244)
  • Open Access

    ARTICLE

    An Effective Approach of Secured Medical Image Transmission Using Encryption Method

    Ranu Gupta1,3,*, Rahul Pachauri2,3, Ashutosh Kumar Singh1,4

    Molecular & Cellular Biomechanics, Vol.15, No.2, pp. 63-83, 2018, DOI: 10.3970/mcb.2018.00114

    Abstract Various chaos-based image encryption schemes have been proposed in last few years. The proposed image encryption method uses chaotic map. The encryption is done by using 256 bit long external secret key. The initial condition for the chaotic mapping is evaluated by the use of external secret key along with the mapping function. Besides that, the proposed method is made more robust by applying multiple operations to the pixels of the image depending on the outcome of the calculation of the logistic map. Moreover, block shuffling of the image and modifying the secret key after encryption of each row is… More >

  • Open Access

    ARTICLE

    An Auto-Calibration Approach to Robust and Secure Usage of Accelerometers for Human Motion Analysis in FES Therapies

    Mingxu Sun1,#,*, Yinghang Jiang2,3,#, Qi Liu3,4,*, Xiaodong Liu4

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 67-83, 2019, DOI:10.32604/cmc.2019.06079

    Abstract A Functional Electrical stimulation (FES) therapy is a common rehabilitation intervention after stroke, and finite state machine (FSM) has proven to be an effective and intuitive FES control method. The FSM uses the data information generated by the accelerometer to robustly trigger state transitions. In the medical field, it is necessary to obtain highly safe and accurate acceleration data. In order to ensure the accuracy of the acceleration sensor data without affecting the accuracy of the motion analysis, we need to perform acceleration big data calibration. In this context, we propose a method for robustly calculating the auto-calibration gain using… More >

  • Open Access

    ARTICLE

    A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services

    Dae-Young Kim1, Se Dong Min2, †, Seokhoon Kim3, †, *

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06102

    Abstract The importance of Blockchain and IoT technology have been highlighted in various fields. These are not unaccustomed words anymore in our lives. Although the technologies are in the infancy step and are still many remaining technical challenges, there is no doubt that it will be one of the major parts of the future Internet. The efficiency and security of data transmission scheme have always been major issues in the legacy Internet, and a data transmission scheme for the future Internet, including 5G and IoT environment should also provide and support these issues. Consequently, we propose a new data transmission scheme… More >

  • Open Access

    ARTICLE

    CM-Droid: Secure Container for Android Password Misuse Vulnerability

    Wen Zhang1, Keyue Li1,*, Tianyang Li1, Shaozhang Niu1, Zhenguang Gao2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 181-198, 2019, DOI:10.32604/cmc.2019.05813

    Abstract Android applications are associated with a large amount of sensitive data, therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability. And on this basis,… More >

  • Open Access

    ARTICLE

    Provably Secure APK Redevelopment Authorization Scheme in the Standard Model

    Daofeng Li1,3,*, Mingxing Luo2, Bowen Zhao1,3, Xiangdong Che4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 447-465, 2018, DOI: 10.3970/cmc.2018.03692

    Abstract The secure issues of APK are very important in Android applications. In order to solve potential secure problems and copyrights issues in redevelopment of APK files, in this paper we propose a new APK redevelopment mechanism (APK-SAN). By exploring sanitizable signature technology, APK-SAN allows the original developer to authorize specified modifier who can redevelop the designated source code of APK files. Our scheme does not require interactions between the developer and modifiers. It can reduce the communication overhead and computational overhead for developers. Especially, the signature of redeveloped APK files is valid and maintains the copyrights. The proposed APK-SAN signature… More >

  • Open Access

    ARTICLE

    Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing

    Zhen Yang1,2, Yongfeng Huang1,2,*, Xing Li1,2, Wenyu Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 1-17, 2018, DOI: 10.3970/cmc.2018.03697

    Abstract To cope with privacy leakage caused by multimedia outsourcing and sharing, data provenance is used to analyze leaked multimedia and provide reactive accountability. Existing schemes of multimedia provenance are based on watermarking protocols. In an outsourcing scenario, existing schemes face two severe challenges: 1) when data leakage occurs, there exists a probability that data provenance results can be repudiated, in which case data provenance tracking fails; and 2) when outsourced data are shared, data encryption transfer causes key management burden outside the schemes, and privacy leakage threatens users. In this paper, we propose a novel data provenance scheme with an… More >

  • Open Access

    ARTICLE

    A Novel Quantum Stegonagraphy Based on Brown States

    Zhiguo Qu1,*, Tiancheng Zhu2, Jinwei Wang1, Xiaojun Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 47-59, 2018, DOI: 10.3970/cmc.2018.02215

    Abstract In this paper, a novel quantum steganography protocol based on Brown entangled states is proposed. The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states. Comparing with the previous quantum steganography algorithms, the new protocol focuses on its anti-noise capability for the phase-flip noise, which proved its good security resisting on quantum noise. Furthermore, the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility. If the number of… More >

  • Open Access

    ARTICLE

    Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States

    Gang Xu1,2,*, Ke Xiao1,*, Zongpeng Li3, Xin-Xin Niu2,4, Michael Ryan5

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 809-827, 2019, DOI:10.32604/cmc.2019.04400

    Abstract In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our… More >

  • Open Access

    ARTICLE

    Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications

    Shanshan Yu1, Ju Liu1,*, Xiaoqing Zhang1, Shangbin Wu2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 505-516, 2019, DOI:10.32604/cmc.2019.04282

    Abstract Relay-assisted transmission could effectively enhance the performance of Device-to-Device (D2D) communications when D2D user equipments (UEs) are too far away from each other or the quality of D2D channel is not good enough for direct communications. Meanwhile, security is one of the major concerns for proximity services. The secure relay selection problem for D2D communications underlaying cellular network is studied in this paper. Firstly, we define a relay selection area and derive the closed-form of outage probability in D2D links using a Poisson Point Process (PPP) method. Next, in the defined relay selection area, we propose a secure relay selection… More >

  • Open Access

    ARTICLE

    Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol

    Jifeng Zhong1,*, Zhihao Liu2,3,*, Juan Xu4

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 621-633, 2018, DOI:10.32604/cmc.2018.03706

    Abstract The controlled quantum secure direct communication (CQSDC) with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed. It is found that there are some serious security issues in this protocol. An eavesdropper (Eve) can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation (SCNO) attack. By the same attack, Eve can also steal some information of the secret message that the sender transmits. In addition, the receiver can take the same kind of attack to eavesdrop on some information of… More >

Displaying 231-240 on page 24 of 244. Per Page