Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (93)
  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior of the system. Blockchain technology… More >

  • Open Access

    ARTICLE

    An Anonymous Authentication Scheme with Controllable Linkability for Vehicle Sensor Networks

    Yousheng Zhou1,2, Lvjun Chen1, Xiaofeng Zhao1,*, Zheng Yang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.3, pp. 1101-1118, 2020, DOI:10.32604/cmes.2021.013289

    Abstract Vehicle sensor networks (VSN) play an increasingly important part in smart city, due to the interconnectivity of the infrastructure. However similar to other wireless communications, vehicle sensor networks are susceptible to a broad range of attacks. In addition to ensuring security for both data-at-rest and data-in-transit, it is essential to preserve the privacy of data and users in vehicle sensor networks. Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider (e.g., mining user data to provide personalized services without infringing on user privacy). Controllable linkability can… More >

  • Open Access

    ARTICLE

    A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies

    Ning Liu1, Fan Yang1, *, Xi Xiong1, 2, Yan Chang1, Shibin Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1559-1570, 2020, DOI:10.32604/cmc.2020.010562

    Abstract Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system. The trust management system evaluates, manages, and shares users’ trust values. The service provider (SP) members of the federation system rely on users’ trust values to determine which type and quality of service will be provided to the users. While identity federation systems have the potential to help federated users save time and energy and improve service experience, the benefits also come with significant privacy risks. So far, there has been little discussion about the privacy protection of users in heterogeneous identity federation… More >

  • Open Access

    ARTICLE

    Secure Sharing Scheme of Sensitive Data in the Precision Medicine System

    Deukhun Kim1, Heejin Kim2, Jin Kwak3, *

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1527-1553, 2020, DOI:10.32604/cmc.2020.010535

    Abstract Numerous industries, especially the medical industry, are likely to exhibit significant developments in the future. Ever since the announcement of the precision medicine initiative by the United States in 2015, interest in the field has considerably increased. The techniques of precision medicine are employed to provide optimal treatment and medical services to patients, in addition to the prevention and management of diseases via the collection and analysis of big data related to their individual genetic characteristics, occupation, living environment, and dietary habits. As this involves the accumulation and utilization of sensitive information, such as patient history, DNA, and personal details,… More >

  • Open Access

    ARTICLE

    An Efficient Certificateless Aggregate Signature Scheme Designed for VANET

    Cui Li1, *, Gang Wu1, Lipeng Xing1, Feng Zhu1, Liang Zhao2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 725-742, 2020, DOI:10.32604/cmc.2020.07188

    Abstract The Vehicular Ad-hoc Network (VANET) is the fundamental of smart transportation system in the future, but the security of the communication between vehicles and vehicles, between vehicles and roadside infrastructures have become increasingly prominent. Certificateless aggregate signature protocol is used to address this security issue, but the existing schemes still have many drawbacks in terms of security and efficiency: First, many schemes are not secure, and signatures can be forged by the attacker; Second, even if some scheme are secure, many schemes use a large number of bilinear pairing operation, and the computation overhead is large. At the same time,… More >

  • Open Access

    ARTICLE

    An Efficient and Practical Quantum Blind Signature Protocol with Relaxed Security Model

    Jun Zhang1, *, Hao Xiao2, Hongqun Zhai1, Xiaoli Meng3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 301-313, 2020, DOI:10.32604/cmc.2020.07681

    Abstract Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness. Owing to the potential unconditional security, quantum blind signature (QBS) is more advantageous than the classical ones. In this paper, an efficient and practical quantum blind signature scheme relaxed security model is presented, where quantum superposition, decoy qubits and hash function are used for the purpose of blindness. Compared with previous QBS scheme, the presented scheme is more efficient and practical with a relaxed security model, in which the… More >

  • Open Access

    ARTICLE

    A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things

    Chaoyang Li1,2,3, Gang Xu2, Yuling Chen1,*, Haseeb Ahmad4, Jian Li3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 711-726, 2019, DOI:10.32604/cmc.2019.06279

    Abstract Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public, distributed and decentration. And blockchain-enabled internet of things (BIoT) has a tendency to make a revolutionary change for the internet of things (IoT) which requires distributed trustless consensus. However, the scalability and security issues become particularly important with the dramatically increasing number of IoT devices. Especially, with the development of quantum computing, many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks. In this paper, an anti-quantum proxy blind signature scheme based on the lattice cryptography has been… More >

  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) is proposed in this paper.… More >

  • Open Access

    ARTICLE

    Provably Secure APK Redevelopment Authorization Scheme in the Standard Model

    Daofeng Li1,3,*, Mingxing Luo2, Bowen Zhao1,3, Xiangdong Che4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 447-465, 2018, DOI: 10.3970/cmc.2018.03692

    Abstract The secure issues of APK are very important in Android applications. In order to solve potential secure problems and copyrights issues in redevelopment of APK files, in this paper we propose a new APK redevelopment mechanism (APK-SAN). By exploring sanitizable signature technology, APK-SAN allows the original developer to authorize specified modifier who can redevelop the designated source code of APK files. Our scheme does not require interactions between the developer and modifiers. It can reduce the communication overhead and computational overhead for developers. Especially, the signature of redeveloped APK files is valid and maintains the copyrights. The proposed APK-SAN signature… More >

  • Open Access

    ARTICLE

    An Advanced Quantum-Resistant Signature Scheme for Cloud Based on Eisenstein Ring

    Faguo Wu1,2, Xiao Zhang1,2, Wang Yao1,2, Zhiming Zheng1,2, Lipeng Xiang3, Wanpeng Li4

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 19-34, 2018, DOI: 10.3970/cmc.2018.02664

    Abstract Signature, widely used in cloud environment, describes the work as readily identifying its creator. The existing signature schemes in the literature mostly rely on the Hardness assumption which can be easily solved by quantum algorithm. In this paper, we proposed an advanced quantum-resistant signature scheme for Cloud based on Eisenstein Ring (ETRUS) which ensures our signature scheme proceed in a lattice with higher density. We proved that ETRUS highly improve the performance of traditional lattice signature schemes. Moreover, the Norm of polynomials decreases significantly in ETRUS which can effectively reduce the amount of polynomials convolution calculation. Furthermore, storage complexity of… More >

Displaying 81-90 on page 9 of 93. Per Page