Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (672)
  • Open Access

    ARTICLE

    New Quantum Private Comparison Using Hyperentangled GHZ State

    Jerrel Gianni1, Zhiguo Qu2,*

    Journal of Quantum Computing, Vol.3, No.2, pp. 45-54, 2021, DOI:10.32604/jqc.2021.019675

    Abstract In this paper, we propose a new protocol designed for quantum private comparison (QPC). This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party (TP) to achieve the objective. This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom (DOF), which could have 64 combinations. The TP can decide which combination to use based on the shared key information provided from a quantum key distribution (QKD) protocol. By doing so, the security of the protocol can be improved further. Decoy photon technology is also used as another means of… More >

  • Open Access

    ARTICLE

    A Hybrid Scheme for Secure Wireless Communications in IoT

    Muhammad Irshad Nazeer1,2,*, Ghulam Ali Mallah1, Raheel Ahmed Memon2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 633-648, 2021, DOI:10.32604/iasc.2021.017771

    Abstract Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces the number of transmissions and offers energy efficiency. It is vulnerable to threat and attack that can harm intermediate nodes. Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats. The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic Algorithm based cryptosystem. A hybrid… More >

  • Open Access

    ARTICLE

    Smartphone Security Using Swipe Behavior-based Authentication

    Adnan Bin Amanat Ali1, Vasaki Ponnusamy1, Anbuselvan Sangodiah1, Roobaea Alroobaea2, N. Z. Jhanjhi3,*, Uttam Ghosh4, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 571-585, 2021, DOI:10.32604/iasc.2021.015913

    Abstract Most smartphone users prefer easy and convenient authentication without remembering complicated passwords or drawing intricate patterns. Preferably, after one-time authentication, there is no verification of the user’s authenticity. Therefore, security and privacy against unauthorized users is a crucial research area. Behavioral authentication is an emerging security technique that is gaining attention for its uniqueness and transparency. In this paper, a behavior-based authentication system is built using swipe movements to continuously authenticate the user after one-time traditional authentication. The key feature is the selection of an optimal feature set for the swipe movement. Five machine learning classifiers are used, of which… More >

  • Open Access

    ARTICLE

    Ecological Security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model

    Xiaozhou Li1,2, Zhenggang Xu1, Yuanyuan Fu3, Qi Jin1, Yunlin Zhao1,*, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 985-1001, 2021, DOI:10.32604/cmc.2021.017357

    Abstract Today, resource depletion threatens a number of resource-based cities in China. The ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of resource-exhausted cities. Using 23 indicators, this study evaluated the ecological security status and development trends of 21 resource-exhausted cities in China from 2011 to 2017. The results showed that from 2011 to 2015, the overall ecological security of this type of city was low, with over 60% of the cities at an unsafe level. However, ecological security improved rapidly after 2016, and by 2017, all of… More >

  • Open Access

    ARTICLE

    Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

    Farouq Aliyu1,*, Tarek Sheltami1, Ashraf Mahmoud1, Louai Al-Awami1, Ansar Yasar2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1159-1181, 2021, DOI:10.32604/cmc.2021.016938

    Abstract Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomaly-based Intrusion Detection and Prevention System (IDPS) against Man-in-the-Middle (MITM) attack in the fog layer. The system uses special nodes known as Intrusion Detection System (IDS) nodes to detect… More >

  • Open Access

    ARTICLE

    An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment

    K. Raju*, M. Chinnadurai

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1057-1072, 2021, DOI:10.32604/cmc.2021.016068

    Abstract Security is a critical issue in cloud computing (CC) because attackers can fabricate data by creating, copying, or deleting data with no user authorization. Most of the existing techniques make use of password-based authentication for encrypting data. Password-based schemes suffer from several issues and can be easily compromised. This paper presents a new concept of hybrid metaheuristic optimization as an identity-based secure and optimal authentication (HMO-ISOA) scheme for CC environments. The HMO-ISOA technique makes use of iris and fingerprint biometrics. Initially, the HMO-ISOA technique involves a directional local ternary quantized extrema pattern–based feature extraction process to extract features from the… More >

  • Open Access

    ARTICLE

    Mining Bytecode Features of Smart Contracts to Detect Ponzi Scheme on Blockchain

    Xiajiong Shen1,3, Shuaimin Jiang2,3, Lei Zhang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 1069-1085, 2021, DOI:10.32604/cmes.2021.015736

    Abstract The emergence of smart contracts has increased the attention of industry and academia to blockchain technology, which is tamper-proofing, decentralized, autonomous, and enables decentralized applications to operate in untrustworthy environments. However, these features of this technology are also easily exploited by unscrupulous individuals, a typical example of which is the Ponzi scheme in Ethereum. The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant. To solve this problem, we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode. In… More >

  • Open Access

    ARTICLE

    NVM Storage in IoT Devices: Opportunities and Challenges

    Yang Liu1, Shan Zhao1,*, Wenhan Chen1, Xuran Ge1, Fang Liu2, Shuo Li3, Nong Xiao1

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 393-409, 2021, DOI:10.32604/csse.2021.017224

    Abstract Edge storage stores the data directly at the data collection point, and does not need to transmit the collected data to the storage central server through the network. It is a critical technology that supports applications such as edge computing and 5G network applications, with lower network communication overhead, lower interaction delay and lower bandwidth cost. However, with the explosion of data and higher real-time requirements, the traditional Internet of Things (IoT) storage architecture cannot meet the requirements of low latency and large capacity. Non-volatile memory (NVM) presents new possibilities regarding this aspect. This paper classifies the different storage architectures… More >

  • Open Access

    ARTICLE

    Reverse Engineering of Mobile Banking Applications

    Syeda Warda Asher1, Sadeeq Jan1,*, George Tsaramirsis2, Fazal Qudus Khan3, Abdullah Khalil1, Muhammad Obaidullah4

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 265-278, 2021, DOI:10.32604/csse.2021.016787

    Abstract Software reverse engineering is the process of analyzing a software system to extract the design and implementation details. Reverse engineering provides the source code of an application, the insight view of the architecture and the third-party dependencies. From a security perspective, it is mostly used for finding vulnerabilities and attacking or cracking an application. The process is carried out either by obtaining the code in plaintext or reading it through the binaries or mnemonics. Nowadays, reverse engineering is widely used for mobile applications and is considered a security risk. The Open Web Application Security Project (OWASP), a leading security research… More >

  • Open Access

    ARTICLE

    Analysis of Security Testing Techniques

    Omer Bin Tauqeer1, Sadeeq Jan1,*, Alaa Omar Khadidos2, Adil Omar Khadidos3, Fazal Qudus Khan3, Sana Khattak1

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 291-306, 2021, DOI:10.32604/iasc.2021.017260

    Abstract In the past decades, a significant increase has been observed in cyber-attacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in the field of security testing… More >

Displaying 501-510 on page 51 of 672. Per Page