Review
Computer Science, Information Systems
Shamsher Ullah, Zheng Jiangbin, Nizamud Din, Muhammad Tanveer Hussain, Farhan Ullah, Mahwish Yousaf
Summary: Elliptic Curve (EC) is an advanced technique of Elliptic Curve Cryptography (ECC) that improves the security of open communication networks and allows confirmed identities into the Modern Digital Era (MDE). The study of cryptography is essential to protect data transmission and information transfer. The adoption of EC methods in distributed computing and asynchronous networking provides significant benefits.
COMPUTER SCIENCE REVIEW
(2023)
Article
Telecommunications
S. Anirudh, R. Shaan Sundar, Sannasi Ganapathy
Summary: Blockchain technology is crucial in securing various application data. A new cryptographic system is proposed to protect research articles with high efficiency and effectiveness.
WIRELESS PERSONAL COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Atef Bentahar, Abdallah Meraoumia, Louardi Bradji, Hakim Bendjenna
Summary: This article proposes a simple, efficient, and secure key agreement scheme for IoT-based S2aaS model. Users can securely access public services through a simple website rather than a traditional smart card, and various encryption algorithms are used to establish secure key agreement and data exchange sessions.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Mubarak Mehdi, Muhammad Taha Ajani, Hasan Tahir, Shahzaib Tahir, Zahoor Alizai, Fawad Khan, Qaiser Riaz, Mehdi Hussain
Summary: The article discusses the possibility of using PUF as the basis for group key generation, with the challenge lying in identifying the unique and stable device features. Each device generates its own identity to collaboratively generate cryptographic keys. The research uses a hardware testbed to demonstrate the viability of PUFs and compares it to traditional cryptographic implementations.
Review
Computer Science, Information Systems
Ana Goulart, Anitha Chennamaneni, Damiano Torre, Byul Hur, Fadhil Y. Al-Aboosi
Summary: The Internet of Things allows users to collect and control data over the Internet, and to protect the system from cyber threats, confidentiality, integrity, and authentication are necessary. Lightweight encryption algorithms have been proposed for IoT devices due to their limited resources. This review combines the topics of communication protocols and lightweight security from a practitioner's standpoint.
Article
Computer Science, Hardware & Architecture
G. Megala, P. Swarnalatha
Summary: This study aims to protect the privacy and integrity of videos stored in the cloud. A stream cipher suite involving key generation, encryption, and authentication phases is designed, along with a new authentication mechanism. Experimental results show that the proposed method has advantages such as fast processing, security, and resistance to attacks.
COMPUTERS & ELECTRICAL ENGINEERING
(2022)
Article
Computer Science, Hardware & Architecture
Dipanwita Sadhukhan, Sangram Ray, G. P. Biswas, M. K. Khan, Mou Dasgupta
Summary: The development of IoT technology has made IoT services more reliable. In order to ensure secure data transmission between remote users and IoT networks, this research proposes a secure authentication scheme and verifies its reliability through multiple cryptographic attacks.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Information Systems
Shafi Ullah, Raja Zahilah Radzi, Tulha Moaiz Yazdani, Ali Alshehri, Ilyas Khan
Summary: This paper provides in-depth studies on different types and techniques of hardware and software-based lightweight cryptographies for machine-type communication devices in machine-to-machine communication networks.
Article
Computer Science, Information Systems
Adote Francois-Xavier Ametepe, Arnaud S. R. M. Ahouandjinou, Eugene C. Ezin
Summary: This research proposes an encryption method for ensuring data integrity and confidentiality in wireless sensor networks. It utilizes AES encryption and Elliptic Curves Diffie-Hellman key exchange to address the resource constraints of WSN.
Article
Computer Science, Artificial Intelligence
V. Padmanabha Reddy, R. Murali Prasad, Pamula Udayaraju, Bhattu HariPrasad Naik, Ch. Raja
Summary: The healthcare industry faces the challenge of handling a large amount of confidential information. This study proposes an efficient data storage and protection system for the internet of medical things, which uses a modified version of the lossless LZW compression algorithm to compress data before storing it locally and encrypting it before sending it to the cloud. The suggested security strategy combines symmetric and asymmetric key cryptography to provide a higher level of protection. Compared to traditional techniques, the suggested model significantly reduces the time for key generation and data encryption, and improves the system throughput.
Article
Computer Science, Artificial Intelligence
Hua Yi Lin
Summary: A hierarchical cluster elliptic curve key agreement scheme is proposed for secure data transmissions in wireless sensor networks. This scheme relies on elliptic curves instead of logarithmic curves, using a shorter key length to achieve similar security classification, while providing a rapid, efficient, and dynamic group key synchronization technique.
CONNECTION SCIENCE
(2022)
Article
Computer Science, Information Systems
Shreeya Swagatika Sahoo, Sujata Mohanty, Kshira Sagar Sahoo, Mahmoud Daneshmand, Amir H. Gandomi
Summary: The Internet of Things (IoT) is a growing technology that allows physical devices to connect with each other over a public channel. The security of 5G with IoT has been a focus of research. An existing IoT-based authentication scheme was found to have flaws in user anonymity, session key security, authentication in the login phase, and password update phase. To address these weaknesses, we propose an improved three-factor-based data transmission authentication scheme (TDTAS). Formal security analysis using the Real-or-Random (RoR) model and informal security analysis demonstrate that the proposed scheme is secure against known attacks and offers more security features. Furthermore, comparison with other schemes shows that our proposed scheme has lower communication and storage costs.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Automation & Control Systems
Sangjukta Das, Suyel Namasudra
Summary: The exponential growth of IoT technologies has increased the demand for data security. This article proposes a novel CP-ABE technique based on elliptic curve cryptography, which achieves fine-grained access control and improves efficiency by introducing multiple attribute authorities and outsourcing the decryption process.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Sikandar Zulqarnain Khan, Sajjad Shaukat Jamal, Asher Sajid, Muhammad Rashid
Summary: This paper presents an efficient crypto processor architecture for key agreement using ECDH protocol. The architecture consists of Elliptic-curve Point Multiplication structure for public key generation and integration of that with additional routing multiplexers and a controller for shared key generation. The proposed architecture achieves area optimization and power reduction, making it suitable for applications with low hardware resources and power consumption.
CMC-COMPUTERS MATERIALS & CONTINUA
(2022)
Article
Computer Science, Hardware & Architecture
Sanaz Amanlou, Mohammad Kamrul Hasan, Khairul Azmi Abu Bakar
Summary: The Internet of Things has integrated with Cloud computing to serve users in different locations, but the growth of smart devices has posed challenges for Cloud computing, leading to the emergence of Fog computing. Authentication is crucial for security in Fog computing, and the proposed ECDHE-PSK authentication scheme addresses the limited resources of IoT devices while providing lightweight and secure authentication.
Editorial Material
Computer Science, Theory & Methods
Kiho Lim, Christian Esposito, Tian Wang, Chang Choi
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Editorial Material
Computer Science, Theory & Methods
Jesus Carretero, Dagmar Krefting
Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab
Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen
Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Editorial Material
Computer Science, Theory & Methods
Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues
Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Robert Sajina, Nikola Tankovic, Ivo Ipsic
Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Hebert Cabane, Kleinner Farias
Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad
Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan
Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo
Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng
Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee
Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup
Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu
Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)