Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (141)
  • Open Access

    ARTICLE

    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and More >

  • Open Access

    ARTICLE

    Dynamic Trust Model Based on Service Recommendation in Big Data

    Gang Wang1,*, Mengjuan Liu2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 845-857, 2019, DOI:10.32604/cmc.2019.03678

    Abstract In big data of business service or transaction, it is impossible to provide entire information to both of services from cyber system, so some service providers made use of maliciously services to get more interests. Trust management is an effective solution to deal with these malicious actions. This paper gave a trust computing model based on service-recommendation in big data. This model takes into account difference of recommendation trust between familiar node and stranger node. Thus, to ensure accuracy of recommending trust computing, paper proposed a fine-granularity similarity computing method based on the similarity of More >

  • Open Access

    ARTICLE

    A Fair Blind Signature Scheme to Revoke Malicious Vehicles in VANETs

    Xiaoliang Wang1,*, Jianming Jiang1,2, Shujing Zhao1, Liang Bai1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 249-262, 2019, DOI:10.32604/cmc.2019.04088

    Abstract With the rapid development of IoT (Internet of Things), VANETs (Vehicular Ad-Hoc Networks) have become an attractive ad-hoc network that brings convenience into people’s lives. Vehicles can be informed of the position, direction, speed and other real-time information of nearby vehicles to avoid traffic jams and accidents. However, VANET environments could be dangerous in the absence of security protection. Because of the openness and self-organization of VANETs, there are plenty of malicious pathways. To guarantee vehicle security, the research aims to provide an effective VANET security mechanism that can track malicious vehicles as necessary. Therefore, More >

  • Open Access

    ARTICLE

    Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage

    Zhiliang Deng1,2, Yongjun Ren3,4, Yepeng Liu3,4, Xiang Yin5, Zixuan Shen3,4, Hye-Jin Kim6,*

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 135-151, 2019, DOI:10.32604/cmc.2019.02967

    Abstract Cloud storage represents the trend of intensive, scale and specialization of information technology, which has changed the technical architecture and implementation method of electronic records management. Moreover, it will provide a convenient way to generate more advanced and efficient management of the electronic data records. However, in cloud storage environment, it is difficult to guarantee the trustworthiness of electronic records, which results in a series of severe challenges to electronic records management. Starting from the definition and specification of electronic records, this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the More >

  • Open Access

    ARTICLE

    Research on Trust Model in Container-Based Cloud Service

    Xiaolan Xie1,2, Tianwei Yuan1,*, Xiao Zhou3, Xiaochun Cheng4

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 273-283, 2018, DOI:10.3970/cmc.2018.03587

    Abstract Container virtual technology aims to provide program independence and resource sharing. The container enables flexible cloud service. Compared with traditional virtualization, traditional virtual machines have difficulty in resource and expense requirements. The container technology has the advantages of smaller size, faster migration, lower resource overhead, and higher utilization. Within container-based cloud environment, services can adopt multi-target nodes. This paper reports research results to improve the traditional trust model with consideration of cooperation effects. Cooperation trust means that in a container-based cloud environment, services can be divided into multiple containers for different container nodes. When multiple More >

  • Open Access

    ARTICLE

    Modelling the Roles of Cewebrity Trust and Platform Trust in Consumers’ Propensity of Live-Streaming: An Extended TAM Method

    Donghui Li1, Guozheng Zhang1,*, Zeng Xu1, Yong Lan1, Yongdong Shi2, Zhiyao Liang2, Haiwen Chen3

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 137-150, 2018, DOI:10.3970/cmc.2018.055.137

    Abstract Live streaming is a booming industry in China, involving an increasing number of Internet users. Previous studies show that trust is a cornerstone to develop e-commerce. Trust in the streaming industry is different from that of other e-commerce areas. There are two major dimensions of trust in the live streaming context: platform trust and cewebrity trust, which are both important for customers to adopt and reuse a specific live streaming service. We collected questionnaire data from 520 participates who have used live streaming services in China. We model the collected data and identified factors that More >

  • Open Access

    ARTICLE

    Securing Display Path for Security-Sensitive Applications on Mobile Devices

    Jinhua Cui1,2, Yuanyuan Zhang3, Zhiping Cai1,*, Anfeng Liu4, Yangyang Li5

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 17-35, 2018, DOI:10.3970/cmc.2018.055.017

    Abstract While smart devices based on ARM processor bring us a lot of convenience, they also become an attractive target of cyber-attacks. The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities. Nowadays, adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application. A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device. In this work, we present a scheme named SecDisplay More >

  • Open Access

    EDITORIAL

    Do You Trust Your Testosterone Level?

    Leonard G. Gomella

    Canadian Journal of Urology, Vol.18, No.2, pp. 5581-5581, 2011

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Sequential Approximate Optimization Procedure based on Sample-reusable Moving Least Squares Meta-model and its Application to Design Optimizations

    Jin Yeon Cho1, Min Hwan Oh1

    CMES-Computer Modeling in Engineering & Sciences, Vol.66, No.3, pp. 187-214, 2010, DOI:10.3970/cmes.2010.066.187

    Abstract In this work, a sample-reusable sequential approximate optimization (SAO) procedure is suggested. The suggested sequential approximate optimization procedure utilizes a newly proposed sample-reusable meta-model along with the trust region algorithm. Domain of design is sequentially updated to search for the optimal solution through the trust region algorithm, and the system response in the updated design region at each sequential stage is approximated by the proposed sample-reusable meta-model. The proposed sample-reusable meta-model is based on the moving least squares(MLS) approximation scheme. Thanks to the merits of moving least squares scheme, the proposed meta-model can fully utilize More >

Displaying 131-140 on page 14 of 141. Per Page