Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    A Decentralized Identity Framework for Secure Federated Learning in Healthcare

    Samuel Acheme*, Glory Nosawaru Edegbe

    Journal of Cyber Security, Vol.8, pp. 1-31, 2026, DOI:10.32604/jcs.2026.073923 - 07 January 2026

    Abstract Federated learning (FL) enables collaborative model training across decentralized datasets, thus maintaining the privacy of training data. However, FL remains vulnerable to malicious actors, posing significant risks in privacy-sensitive domains like healthcare. Previous machine learning trust frameworks, while promising, often rely on resource-intensive blockchain ledgers, introducing computational overhead and metadata leakage risks. To address these limitations, this study presents a novel Decentralized Identity (DID) framework for mutual authentication that establishes verifiable trust among participants in FL without dependence on centralized authorities or high-cost blockchain ledgers. The proposed system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials… More >

  • Open Access

    ARTICLE

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    D. Bernal*, O. Ledesma, P. Lamo, J. Bermejo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-39, 2026, DOI:10.32604/cmc.2025.069746 - 10 November 2025

    Abstract This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices,… More >

  • Open Access

    ARTICLE

    3RVAV: A Three-Round Voting and Proof-of-Stake Consensus Protocol with Provable Byzantine Fault Tolerance

    Abeer S. Al-Humaimeedy*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5207-5236, 2025, DOI:10.32604/cmc.2025.068273 - 23 October 2025

    Abstract This paper presents 3RVAV (Three-Round Voting with Advanced Validation), a novel Byzantine Fault Tolerant consensus protocol combining Proof-of-Stake with a multi-phase voting mechanism. The protocol introduces three layers of randomized committee voting with distinct participant roles (Validators, Delegators, and Users), achieving -threshold approval per round through a verifiable random function (VRF)-based selection process. Our security analysis demonstrates 3RVAV provides resistance to Sybil attacks with participants and stake , while maintaining communication complexity. Experimental simulations show 3247 TPS throughput with 4-s finality, representing a 5.8× improvement over Algorand’s committee-based approach. The proposed protocol achieves approximately 4.2-s More >

  • Open Access

    ARTICLE

    Research on Efficient Storage Consistency Verification Technology for On-Chain and Off-Chain Data

    Wei Lin, Yi Sun*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5117-5134, 2025, DOI:10.32604/cmc.2025.067968 - 23 October 2025

    Abstract To enable efficient sharing of unbounded streaming data, this paper introduces blockchain technology into traditional cloud data, proposing a hybrid on-chain/off-chain storage model. We design a real-time verifiable data structure that is more suitable for streaming data to achieve efficient real-time verifiability for streaming data. Based on the notch gate hash function and vector commitment, an adaptive notch gate hash tree structure is constructed, and an efficient real-time verifiable data structure for on-chain and off-chain stream data is proposed. The structure binds dynamic root nodes sequentially to ordered leaf nodes in its child nodes. Only… More >

  • Open Access

    ARTICLE

    An Efficient and Verifiable Data Aggregation Protocol with Enhanced Privacy Protection

    Yiming Zhang1, Wei Zhang1,2,*, Cong Shen3

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3185-3211, 2025, DOI:10.32604/cmc.2025.067563 - 23 September 2025

    Abstract Distributed data fusion is essential for numerous applications, yet faces significant privacy security challenges. Federated learning (FL), as a distributed machine learning paradigm, offers enhanced data privacy protection and has attracted widespread attention. Consequently, research increasingly focuses on developing more secure FL techniques. However, in real-world scenarios involving malicious entities, the accuracy of FL results is often compromised, particularly due to the threat of collusion between two servers. To address this challenge, this paper proposes an efficient and verifiable data aggregation protocol with enhanced privacy protection. After analyzing attack methods against prior schemes, we implement… More >

  • Open Access

    ARTICLE

    VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server

    Peizheng Lai1, Minqing Zhang1,2,*, Yixin Tang1, Ya Yue1, Fuqiang Di1,2

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2935-2957, 2025, DOI:10.32604/cmc.2025.065887 - 03 July 2025

    Abstract Federated Learning (FL) has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing. However, its reliance on a server introduces critical security vulnerabilities: malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results. Consequently, achieving verifiable aggregation without compromising client privacy remains a critical challenge. To address these problem, we propose a reversible data hiding in encrypted domains (RDHED) scheme, which designs joint secret message embedding and extraction mechanism. This approach enables clients to embed secret messages… More >

  • Open Access

    ARTICLE

    P2V-Fabric: Privacy-Preserving Video Using Hyperledger Fabric

    Muhammad Saad, Ki-Woong Park*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1881-1900, 2025, DOI:10.32604/cmc.2025.061733 - 16 April 2025

    Abstract The proliferation of Internet of Things (IoT) devices introduces substantial security challenges. Currently, privacy constitutes a significant concern for individuals. While maintaining privacy within these systems is an essential characteristic, it often necessitates certain compromises, such as complexity and scalability, thereby complicating management efforts. The principal challenge lies in ensuring confidentiality while simultaneously preserving individuals’ anonymity within the system. To address this, we present our proposed architecture for managing IoT devices using blockchain technology. Our proposed architecture works on and off blockchain and is integrated with dashcams and closed-circuit television (CCTV) security cameras. In this… More >

  • Open Access

    ARTICLE

    A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems

    Jiyu Zhang1,*, Kehe Wu1, Ruomeng Yan1, Zheng Tian2, Yizhen Sun2, Yuxi Wu2, Yaogong Guo3

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1211-1232, 2025, DOI:10.32604/cmc.2024.055243 - 03 January 2025

    Abstract Renewable Energy Systems (RES) provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers (ES). However, securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic. Additionally, managing attributes, including addition, deletion, and modification, is a crucial issue in the access control scheme for RES. To address these security concerns, a trust-based ciphertext-policy attribute-based encryption (CP-ABE) device access control scheme is proposed for RES (TB-CP-ABE). This… More >

  • Open Access

    ARTICLE

    VKFQ: A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain

    Youlin Ji, Bo Yin*, Ke Gu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4205-4223, 2024, DOI:10.32604/cmc.2024.049086 - 26 March 2024

    Abstract With its untameable and traceable properties, blockchain technology has been widely used in the field of data sharing. How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing. In this paper, we study verifiable keyword frequency (KF) queries with local differential privacy in blockchain. Both the numerical and the keyword attributes are present in data objects; the latter are sensitive and require privacy protection. However, prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries. We… More >

  • Open Access

    ARTICLE

    Distributed Timestamp Mechanism Based on Verifiable Delay Functions

    Qiang Wu1, Zhaoyang Han2, Ghulam Mohiuddin3, Yongjun Ren1,*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1633-1646, 2023, DOI:10.32604/csse.2023.030646 - 15 June 2022

    Abstract In the data communication system, the real-time information interaction of communication device increases the risk of privacy sensitive data being tampered with. Therefore, maintaining data security is one of the most important issues in network data communication. Because the timestamp is the most important way to authenticate data in information interaction, it is very necessary to provide timestamp service in the data communication system. However, the existing centralized timestamp mechanism is difficult to provide credible timestamp service, and users can conspire with timestamping servers to forge timestamps. Therefore, this paper designs a distributed timestamp mechanism… More >

Displaying 1-10 on page 1 of 16. Per Page