Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,008)
  • Open Access

    ARTICLE

    Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

    A. S. Anakath1,*, S. Ambika2, S. Rajakumar3, R. Kannadasan4, K. S. Sendhil Kumar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 833-847, 2022, DOI:10.32604/csse.2022.022329 - 20 April 2022

    Abstract Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner. Thus, ensuring the security and confidentiality of the data while processing in the centralized network is very difficult. The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network. Intruders are very active over the network like real authenticated user to hack the personal sensitive… More >

  • Open Access

    ARTICLE

    Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption

    Gang Xu1,2, Fan Yun1, Xiu-Bo Chen3,*, Shiyuan Xu1, Jingzhong Wang1, Tao Shang4, Yan Chang5, Mianxiong Dong6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 531-541, 2022, DOI:10.32604/iasc.2022.028264 - 15 April 2022

    Abstract Secure multi-party computation has been playing a fundamental role in terms of classical cryptography. Quantum homomorphic encryption (QHE) could compute the encrypted data without decryption. At present, most protocols use a semi-honest third party (TP) to protect participants’ secrets. We use a quantum homomorphic encryption scheme instead of TP to protect the privacy of parties. Based on quantum homomorphic encryption, a secure multi-party quantum summation scheme is proposed in which N participants can delegate a server with strong quantum computing power to assist computation. By delegating the computation and key update processes to a server and… More >

  • Open Access

    ARTICLE

    A Secure E-commerce Environment Using Multi-agent System

    Farah Tawfiq Abdul Hussien*, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 499-514, 2022, DOI:10.32604/iasc.2022.025091 - 15 April 2022

    Abstract Providing security for the customers in the e-commerce system is an essential issue. Providing security for each single online customer at the same time is considered a time consuming process. For a huge websites such task may cause several problems including response delay, losing the customer orders and system deadlock or crash, in which reduce system performance. This paper aims to provide a new prototype structure of multi agent system that solve the problem of providing security and avoid the problems that may reduce system performance. This is done by creating a software agent which More >

  • Open Access

    ARTICLE

    Smart Grid Security by Embedding S-Box Advanced Encryption Standard

    Niraj Kumar1,*, Vishnu Mohan Mishra2, Adesh Kumar3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 623-638, 2022, DOI:10.32604/iasc.2022.024804 - 15 April 2022

    Abstract Supervisory control and data acquisition (SCADA) systems continuously monitor the real-time processes in the smart grid. The system software, which is based on a human-machine interface (HMI), makes intelligent decisions to assist the system operator and perform normal grid management activities. The management of SCADA networks and monitoring without proper security is a major concern, as many grids and plant networks still lack necessary monitoring and detection systems, making them vulnerable to attack. SCADA networks exploit physical weaknesses as well as cyber-attacks. Researchers have developed a monitoring system based on a field-programmable gate array (FPGA)… More >

  • Open Access

    ARTICLE

    Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security

    Ala’ A. Eshmawi1, Suliman A. Alsuhibany2, Sayed Abdel-Khalek3, Romany F. Mansour4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4173-4184, 2022, DOI:10.32604/cmc.2022.028008 - 29 March 2022

    Abstract Digital image security is a fundamental and tedious process on shared communication channels. Several methods have been employed for accomplishing security on digital image transmission, such as encryption, steganography, and watermarking. Image stenography and encryption are commonly used models to achieve improved security. Besides, optimal pixel selection process (OPSP) acts as a vital role in the encryption process. With this motivation, this study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security, named CSOES-DIS technique. The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Enabled Intrusion Detection in Clustered IIoT Environment

    Radwa Marzouk1, Fadwa Alrowais2, Noha Negm3, Mimouna Abdullah Alkhonaini4, Manar Ahmed Hamza5,*, Mohammed Rizwanullah5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3763-3775, 2022, DOI:10.32604/cmc.2022.027483 - 29 March 2022

    Abstract Industrial Internet of Things (IIoT) is an emerging field which connects digital equipment as well as services to physical systems. Intrusion detection systems (IDS) can be designed to protect the system from intrusions or attacks. In this view, this paper presents a novel hybrid deep learning with metaheuristics enabled intrusion detection (HDL-MEID) technique for clustered IIoT environments. The HDL-MEID model mainly intends to organize the IIoT devices into clusters and enabled secure communication. Primarily, the HDL-MEID technique designs a new chaotic mayfly optimization (CMFO) based clustering approach for the effective choice of the Cluster Heads More >

  • Open Access

    ARTICLE

    Multi-Stream CNN-Based Personal Recognition Method Using Surface Electromyogram for 5G Security

    Jin Su Kim1, Min-Gu Kim1, Jae Myung Kim1,2, Sung Bum Pan1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2997-3007, 2022, DOI:10.32604/cmc.2022.026572 - 29 March 2022

    Abstract As fifth generation technology standard (5G) technology develops, the possibility of being exposed to the risk of cyber-attacks that exploits vulnerabilities in the 5G environment is increasing. The existing personal recognition method used for granting permission is a password-based method, which causes security problems. Therefore, personal recognition studies using bio-signals are being conducted as a method to access control to devices. Among bio-signal, surface electromyogram (sEMG) can solve the existing personal recognition problem that was unable to the modification of registered information owing to the characteristic changes in its signal according to the performed operation.… More >

  • Open Access

    ARTICLE

    Selecting Best Software Vulnerability Scanner Using Intuitionistic Fuzzy Set TOPSIS

    Navneet Bhatt1, Jasmine Kaur2, Adarsh Anand2, Omar H. Alhazmi3,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3613-3629, 2022, DOI:10.32604/cmc.2022.026554 - 29 March 2022

    Abstract Software developers endeavor to build their products with the least number of bugs. Despite this, many vulnerabilities are detected in software that threatens its integrity. Various automated software i.e., vulnerability scanners, are available in the market which helps detect and manage vulnerabilities in a computer, application, or a network. Hence, the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management. The current work serves a dual purpose, first, to identify the key factors which affect the vulnerability discovery process in a network. The second, is to rank the popular vulnerability scanners… More >

  • Open Access

    ARTICLE

    An Efficient Security Solution for Industrial Internet of Things Applications

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3961-3983, 2022, DOI:10.32604/cmc.2022.026513 - 29 March 2022

    Abstract The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications. Due to continual needs for new functionality, such as foresight, the number of linked devices in the industrial environment increases. Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments. Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold… More >

  • Open Access

    ARTICLE

    Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*, Maha Farouk S. Sabir1, Ahmed Elhassanein5,6, Ashraf A. Gouda4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3385-3399, 2022, DOI:10.32604/cmc.2022.026477 - 29 March 2022

    Abstract Education acts as an important part of economic growth and improvement in human welfare. The educational sectors have transformed a lot in recent days, and Information and Communication Technology (ICT) is an effective part of the education field. Almost every action in university and college, right from the process from counselling to admissions and fee deposits has been automated. Attendance records, quiz, evaluation, mark, and grade submissions involved the utilization of the ICT. Therefore, security is essential to accomplish cybersecurity in higher security institutions (HEIs). In this view, this study develops an Automated Outlier Detection… More >

Displaying 681-690 on page 69 of 1008. Per Page