Search Results

Results (67)

Search Parameters:

Keyword: Secure
Order results
Results per page
Open AccessArticle
11 Pages, 790 KB Download PDF

CIRB-Edge for Secure, Energy-Efficient, and Real-Time Edge Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 5, Page # 40–50, 2025; DOI: 10.25046/aj100505
Abstract:

In this work, we present CIRB-Edge, a novel integer compression method designed specifically to overcome the limitations of traditional techniques such as Huffman coding, Delta encoding, and dictionary-based algorithms. These legacy methods often fall short in meeting the stringent requirements of secure, energy-efficient, and real-time edge computing due to their high computational overhead, memory demands,…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
11 Pages, 2,600 KB Download PDF

Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 37–47, 2025; DOI: 10.25046/aj100105
Abstract:

Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
11 Pages, 10,815 KB Download PDF

A Secure Medical History Card Powered by Blockchain Technology

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 96–106, 2023; DOI: 10.25046/aj080611
Abstract:

A reliable healthcare system ensures that the population has access to top-notch medical ser- vices, ultimately enhancing their overall health most efficiently. At times, data are not secured or handled appropriately. Addressing these concerns, blockchain technology is projected to bring about a substantial revolution in the medical industry by assuring the confidentiality of electronic health…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Bioinformatics (BIF))
Open AccessArticle
12 Pages, 2,626 KB Download PDF

Technical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 283–294, 2022; DOI: 10.25046/aj070632
Abstract:

In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Safety Science (SFS))
Open AccessArticle
10 Pages, 865 KB Download PDF

Secured Multi-Layer Blockchain Framework for IoT Aggregate Verification

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 106–115, 2022; DOI: 10.25046/aj070312
Abstract:

Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,136 KB Download PDF

A Secure Trust Aware ACO-Based WSN Routing Protocol for IoT

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 95–105, 2022; DOI: 10.25046/aj070311
Abstract:

The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 778 KB Download PDF

Quantum Secure Lightweight Cryptography with Quantum Permutation Pad

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 401–405, 2021; DOI: 10.25046/aj060445
Abstract:

Quantum logic gates represent certain quantum operations to perform quantum computations. Of those quantum gates, there is a category of classical behavior gates called quantum permutation gates. As a quantum algorithm, quantum permutation pad or QPP consists of multiple quantum permutation gates to be implemented both in a quantum computing system as a quantum circuit…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 779 KB Download PDF

Blockchain-Based Decentralized Digital Self-Sovereign Identity Wallet for Secure Transaction

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 977–983, 2021; DOI: 10.25046/aj0602112
Abstract:

Blockchain (BC) as the widespread innovations in the 21st century has recognized itself to be immutable, tamper-resistant, decentralize and secure. This emerging technology is used as a functional technology for refining present technology and forming new applications for its robustness and disintermediation. Decentralized Digital Self-Sovereign Identity (DDSSI) is an identity mapped with individual identity information…

Read More
(This article belongs to Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
6 Pages, 838 KB Download PDF

An Integrated & Secure System for Wearable Devices

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 432–437, 2018; DOI: 10.25046/aj030651
Abstract:

Health services are under increasing pressure to reduce large waiting times for appointments. The delayed diagnosis of a human illnesses could have profound consequences for the patient. The large waiting times may be attributed to lack of data, the accuracy of the data or the timeliness of the availability of the data. In addition to…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 3,341 KB Download PDF

Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 271–282, 2018; DOI: 10.25046/aj030232
Abstract:

In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
13 Pages, 421 KB Download PDF

Short CCA-Secure Attribute-Based Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 261–273, 2018; DOI: 10.25046/aj030132
Abstract:

Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,843 KB Download PDF

A Secure Automated Elevator Management System and Pressure Sensor based Floor Estimation for Indoor Mobile Robot Transportation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1599–1608, 2017; DOI: 10.25046/aj0203199
Abstract:

In this paper, a secure elevator handling system is presented to enable a flexible movement of wheeled mobile robots among laboratories distributed in different floors. The automated handling system consists mainly of an ADAM module which has the ability to call the elevator to the robot’s current floor and to request the destination floor. The…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Automation & Control Systems (ACS))
Open AccessArticle
7 Pages, 484 KB Download PDF

A Secure Communication Framework for ECUs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1307–1313, 2017; DOI: 10.25046/aj0203165
Abstract:

Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 1,704 KB Download PDF

Secure Path Selection under Random Fading

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 376–383, 2017; DOI: 10.25046/aj020348
Abstract:

Application-oriented Wireless Sensor Networks (WSNs) promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP) and Sub-optimal Secure Path (SSP)) to minimize the outage probability of secrecy capacity in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
5 Pages, 877 KB Download PDF

Implementation a Secure Electronic Medical Records Exchange System Based on S/MIME

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 172–176, 2017; DOI: 10.25046/aj020120
Abstract:

The exchange of electronic medical records can reduce the preservation and the use of papers of medical records for management issues. The sharing of electronic medical records has been effective in Taiwan. Now days, enterprises are sharing their electronic medical records through the Exchange Center of EMR under the Virtual Private Network but slightly less…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
12 Pages, 1,302 KB Download PDF

Federated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 65–76, 2025; DOI: 10.25046/aj100606
Abstract:

The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 1,553 KB Download PDF

Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 84–91, 2024; DOI: 10.25046/aj090308
Abstract:

Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 6,868 KB Download PDF

Design and Manufacturing of Soft Grippers for Robotics by Injection Molding Technology

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 4, Page # 11–17, 2023; DOI: 10.25046/aj080402
Abstract:

Soft robots have softer, more flexible, and more compliant characteristics than traditional rigid robots. These qualities encourage more secure relationships between people and machines. Nevertheless, traditional robots continue to rule the commercial sector. Due to the high cost of gripper production, soft robots are very far from being commercially feasible. This research focuses on fabricating…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Manufacturing Engineering (EMF))
Open AccessArticle
11 Pages, 1,778 KB Download PDF

HistoChain: Improving Consortium Blockchain Scalability using Historical Blockchains

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 89–99, 2023; DOI: 10.25046/aj080311
Abstract:

Blockchain technology has been successfully applied in many fields for immutable and secure data storage. However, for applications with on-chain big data, blockchain scalability remains to be a main concern. In this paper, we propose a novel scalable storage scheme, called HistoChain, for a consortium blockchain network to manage blockchain data. We use a current…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 917 KB Download PDF

Matching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 13–19, 2022; DOI: 10.25046/aj070602
Abstract:

Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 1,685 KB Download PDF

On the Prediction of One-Year Ahead Energy Demand in Turkey using Metaheuristic Algorithms

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 4, Page # 79–91, 2022; DOI: 10.25046/aj070411
Abstract:

Estimation of energy demand has important implications for economic and social stability leading to a more secure energy future. One-year-ahead energy demand estimation for Turkey has been proposed in this paper, using the metaheuristics method with GDP, the total population, and the quantities of imports and exports, as inputs variables. The records obtained from historical…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 1,751 KB Download PDF

Cloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 179–190, 2022; DOI: 10.25046/aj070218
Abstract:

Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
1 2 3

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026