Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (319)
  • Open Access

    ARTICLE

    An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things

    Gang Xu1,2,6, Xinyu Fan1, Xiu-Bo Chen2, Xin Liu4, Zongpeng Li5, Yanhui Mao6,7, Kejia Zhang3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2293-2309, 2025, DOI:10.32604/cmc.2024.057882 - 17 February 2025

    Abstract Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure,… More >

  • Open Access

    ARTICLE

    Secure Medical Image Retrieval Based on Multi-Attention Mechanism and Triplet Deep Hashing

    Shaozheng Zhang, Qiuyu Zhang*, Jiahui Tang, Ruihua Xu

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2137-2158, 2025, DOI:10.32604/cmc.2024.057269 - 17 February 2025

    Abstract Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Management System for Enhanced Patient Privacy and Secure Telehealth and Telemedicine Data

    Ayoub Ghani1,*, Ahmed Zinedine1, Mohammed El Mohajir2

    Intelligent Automation & Soft Computing, Vol.40, pp. 75-98, 2025, DOI:10.32604/iasc.2025.060143 - 23 January 2025

    Abstract The Internet of Things (IoT) advances allow healthcare providers to distantly gather and immediately analyze patient health data for diagnostic purposes via connected health devices. In a COVID-19-like pandemic, connected devices can mitigate virus spread and make essential information, such as respiratory patterns, available to healthcare professionals. However, these devices generate vast amounts of data, rendering them susceptible to privacy breaches, and data leaks. Blockchain technology is a robust solution to address these issues in telemedicine systems. This paper proposes a blockchain-based access management solution to enhance patient privacy and secure telehealth and telemedicine data.… More >

  • Open Access

    ARTICLE

    Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission

    Haider H. Al-Mahmood1,*, Saad N. Alsaad2

    Intelligent Automation & Soft Computing, Vol.40, pp. 53-74, 2025, DOI:10.32604/iasc.2024.059691 - 10 January 2025

    Abstract In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism… More >

  • Open Access

    ARTICLE

    AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation

    Congcong Wang1, Chen Wang2,3,*, Wenying Zheng4,*, Wei Gu5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 799-816, 2025, DOI:10.32604/cmc.2024.057975 - 03 January 2025

    Abstract As smart grid technology rapidly advances, the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection. Current research emphasizes data security and user privacy concerns within smart grids. However, existing methods struggle with efficiency and security when processing large-scale data. Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge. This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities. The approach optimizes data preprocessing, More >

  • Open Access

    ARTICLE

    Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks

    Khalil Ullah1,*, Song Jian1, Muhammad Naeem Ul Hassan1, Suliman Khan2, Mohammad Babar3,*, Arshad Ahmad4, Shafiq Ahmad5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1151-1169, 2025, DOI:10.32604/cmc.2024.057328 - 03 January 2025

    Abstract The emergence of next generation networks (NextG), including 5G and beyond, is reshaping the technological landscape of cellular and mobile networks. These networks are sufficiently scaled to interconnect billions of users and devices. Researchers in academia and industry are focusing on technological advancements to achieve high-speed transmission, cell planning, and latency reduction to facilitate emerging applications such as virtual reality, the metaverse, smart cities, smart health, and autonomous vehicles. NextG continuously improves its network functionality to support these applications. Multiple input multiple output (MIMO) technology offers spectral efficiency, dependability, and overall performance in conjunction with More >

  • Open Access

    ARTICLE

    A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs

    Sameh Zarif1,2,*, Hadier Moawad2, Khalid Amin2, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5, Marian Wagdy6

    Computer Systems Science and Engineering, Vol.49, pp. 79-98, 2025, DOI:10.32604/csse.2024.057439 - 03 January 2025

    Abstract Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity. Cloud computing provides a shared electronic device resource for users via the internet, and the authentication techniques used must protect data from attacks. Previous approaches failed to resolve the challenge of making passwords secure, memorable, usable, and time-saving. Graphical Password (GP) is still not widely utilized in reality because consumers suffer from multiple login stages. This paper proposes an Indexed Choice-Based Graphical Password (ICGP) scheme for improving the authentication part. ICGP consists of two stages: registration and authentication. At the… More >

  • Open Access

    ARTICLE

    A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment

    Chanhyeong Cho1, Byeori Kim2, Haehyun Cho2, Taek-Young Youn1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 813-834, 2025, DOI:10.32604/cmes.2024.056952 - 17 December 2024

    Abstract With the rise of remote collaboration, the demand for advanced storage and collaboration tools has rapidly increased. However, traditional collaboration tools primarily rely on access control, leaving data stored on cloud servers vulnerable due to insufficient encryption. This paper introduces a novel mechanism that encrypts data in ‘bundle’ units, designed to meet the dual requirements of efficiency and security for frequently updated collaborative data. Each bundle includes updated information, allowing only the updated portions to be re-encrypted when changes occur. The encryption method proposed in this paper addresses the inefficiencies of traditional encryption modes, such… More >

  • Open Access

    ARTICLE

    Secure Digital Image Watermarking Technique Based on ResNet-50 Architecture

    Satya Narayan Das1,2,*, Mrutyunjaya Panda2,*

    Intelligent Automation & Soft Computing, Vol.39, No.6, pp. 1073-1100, 2024, DOI:10.32604/iasc.2024.057013 - 30 December 2024

    Abstract In today’s world of massive data and interconnected networks, it’s crucial to burgeon a secure and efficient digital watermarking method to protect the copyrights of digital content. Existing research primarily focuses on deep learning-based approaches to improve the quality of watermarked images, but they have some flaws. To overcome this, the deep learning digital image watermarking model with highly secure algorithms is proposed to secure the digital image. Recently, quantum logistic maps, which combine the concept of quantum computing with traditional techniques, have been considered a niche and promising area of research that has attracted… More >

  • Open Access

    ARTICLE

    Secure Image Communication Using Galois Field, Hyper 3D Logistic Map, and B92 Quantum Protocol

    De Rosal Ignatius Moses Setiadi1,2, Nova Rijati2,*, Ahmad Rofiqul Muslikh3, Bonifacius Vicky Indriyono4, Aceng Sambas5,6

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4435-4463, 2024, DOI:10.32604/cmc.2024.058478 - 19 December 2024

    Abstract In this paper, we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext encryption. Specifically, we leverage the B92 Quantum Key Distribution (QKD) protocol to secure the distribution of encryption keys, which are further processed through Galois Field (GF(28)) operations for increased security. The encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map (H3LM), a chaotic system that generates complex and unpredictable sequences, thereby ensuring strong confusion and diffusion in the encryption process. This hybrid approach More >

Displaying 51-60 on page 6 of 319. Per Page