Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (52)
  • Open Access

    ARTICLE

    Smart Contract to Traceability of Food Social Selling

    Cristian Valencia-Payan*, José Fernando Grass-Ramírez, Gustavo Ramirez-Gonzalez, Juan Carlos Corrales

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4703-4728, 2023, DOI:10.32604/cmc.2023.031554

    Abstract Traditionally, food sustainability has been considered solely in the stage of agricultural production. However, globalization, the expansion of the food production industry, and the emergence of supermarket chains that control the retail food market require specific significant changes in supply chains in the food sector and, therefore, we need to address the economic, social, and environmental impacts of these events. On the other hand, social selling has increased rapidly in recent years, with a further boom, following current events related to the coronavirus disease (COVID-19). This explosion of social sales, where there are usually no control and regulation entities, can… More >

  • Open Access

    ARTICLE

    Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain

    Jin Wang1, Wei Ou1, Osama Alfarraj2, Amr Tolba2, Gwang-Jun Kim3,*, Yongjun Ren4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1805-1819, 2023, DOI:10.32604/csse.2023.029622

    Abstract Since transactions in blockchain are based on public ledger verification, this raises security concerns about privacy protection. And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification, when the whole transaction on the chain is verified. In order to improve the efficiency and privacy protection of block data verification, this paper proposes an efficient block verification mechanism with privacy protection based on zero-knowledge proof (ZKP), which not only protects the privacy of users but also improves the speed of data block verification. There is no need to put the whole… More >

  • Open Access

    ARTICLE

    Formal Verification Platform as a Service: WebAssembly Vulnerability Detection Application

    LiangJun Deng1, Hang Lei1, Zheng Yang1, WeiZhong Qian1,*, XiaoYu Li1, Hao Wu2, Sihao Deng3, RuChao Sha1, WeiDong Deng4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2155-2170, 2023, DOI:10.32604/csse.2023.027680

    Abstract In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service (FVPS), which aims to provide an automated report of vulnerability detections, this work builds a Hyperledger Fabric blockchain runtime model. It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages. This methodology utilizes an external application programming interface (API) table to replace the source codes in compilation, thereby pruning the part of housekeeping codes to ease code inflation. Code inflation is a significant metric in formal language translation. Namely, minor code inflation enhances verification scale… More >

  • Open Access

    ARTICLE

    Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency

    Qiuyun Lyu1, Chenhao Ma1, Yanzhao Shen2, Shaopeng Jiao3, Yipeng Sun1, Liqin Hu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1625-1647, 2023, DOI:10.32604/cmes.2022.021562

    Abstract Smart contracts running on public blockchains are permissionless and decentralized, attracting both developers and malicious participants. Ethereum, the world’s largest decentralized application platform on which more than 40 million smart contracts are running, is frequently challenged by smart contract vulnerabilities. What’s worse, since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies, a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum. However, little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected. Thus, we first present the contract dependency… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts

    Yuan Zhuang1, Baobao Wang1, Jianguo Sun2,*, Haoyang Liu1, Shuqi Yang1, Qingan Da3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1011-1024, 2023, DOI:10.32604/cmc.2023.028058

    Abstract Recently, security issues of smart contracts are arising great attention due to the enormous financial loss caused by vulnerability attacks. There is an increasing need to detect similar codes for hunting vulnerability with the increase of critical security issues in smart contracts. Binary similarity detection that quantitatively measures the given code diffing has been widely adopted to facilitate critical security analysis. However, due to the difference between common programs and smart contract, such as diversity of bytecode generation and highly code homogeneity, directly adopting existing graph matching and machine learning based techniques to smart contracts suffers from low accuracy, poor… More >

  • Open Access

    ARTICLE

    Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain

    Nitish Pathak1, Shams Tabrez Siddiqui2, Anjani Kumar Singha3, Heba G Mohamed4, Shabana Urooj4,*, Abhinandan R Patil5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3021-3036, 2023, DOI:10.32604/iasc.2023.029053

    Abstract The coronavirus, formerly known as COVID-19, has caused massive global disasters. As a precaution, most governments imposed quarantine periods ranging from months to years and postponed significant financial obligations. Furthermore, governments around the world have used cutting-edge technologies to track citizens’ activity. Thousands of sensors were connected to IoT (Internet of Things) devices to monitor the catastrophic eruption with billions of connected devices that use these novel tools and apps, privacy and security issues regarding data transmission and memory space abound. In this study, we suggest a blockchain-based methodology for safeguarding data in the billions of devices and sensors connected… More >

  • Open Access

    ARTICLE

    Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices

    Yining Qi1,2,*, Zhen Yang3, Yubo Luo4, Yongfeng Huang1,2, Xing Li1,2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2205-2221, 2022, DOI:10.32604/cmc.2022.027939

    Abstract Provable Data Possession (PDP) schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading. However, with the emerging of network consisting of low performance devices such as Internet of Things, we find that there are still two obstacles for applying PDP schemes. The first one is the heavy computation overhead in generating tags for data blocks, which is essential for setting up any PDP scheme. The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing. In this paper,… More >

  • Open Access

    ARTICLE

    GTCS-Vagus Nerve Stimulator Automation Using Private IoT-Blockchain Smartcontract

    G. Karthikeyan*, G. Kousalya

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1325-1340, 2023, DOI:10.32604/csse.2023.026356

    Abstract Generalized Tonic Clonic Seizure (GTCS) is a form of epileptic seizure in which a patient loses control over their entire body, ultimately leading to loss of consciousness. The Vagus Nerve Stimulator (VNS) is a tool/method for treating epileptic episodes that sends counter-electrical stimulations to the Vagus Nerve in order to mitigate epileptic signals from the brain. The machine is a stand-alone device that depends on human decision-making. The proposed framework uses an IoT and Blockchain oversight mechanism to augment the device's transparency. The system counteracts against false-activation by monitoring the patient's vitals through a smart watch and allows only legitimate… More >

  • Open Access

    ARTICLE

    Hybrid Smart Contracts for Securing IoMT Data

    D. Palanikkumar1, Adel Fahad Alrasheedi2, P. Parthasarathi3, S. S. Askar2, Mohamed Abouhawwash4,5,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 457-469, 2023, DOI:10.32604/csse.2023.024884

    Abstract Data management becomes essential component of patient healthcare. Internet of Medical Things (IoMT) performs a wireless communication between E-medical applications and human being. Instead of consulting a doctor in the hospital, patients get health related information remotely from the physician. The main issues in the E-Medical application are lack of safety, security and privacy preservation of patient’s health care data. To overcome these issues, this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage. Patients health data is collected from physician, smart devices etc. The main goal is to store this highly valuable health related… More >

  • Open Access

    ARTICLE

    Phish Block: A Blockchain Framework for Phish Detection in Cloud

    R. N. Karthika*, C. Valliyammai, M. Naveena

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 777-795, 2023, DOI:10.32604/csse.2023.024086

    Abstract The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy. But, deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes. In Spite of much technological advancement, phishing acts as the first step in a series of attacks. With technological advancements, availability and access to the phishing kits has improved drastically, thus making it an ideal tool for the hackers to execute the attacks. The phishing cases indicate use of foreign characters to disguise the original Uniform Resource Locator (URL), typosquatting the popular domain names, using reserved characters… More >

Displaying 21-30 on page 3 of 52. Per Page