Search Results

Results (67)

Search Parameters:

Keyword: Secure
Order results
Results per page
Open AccessArticle
15 Pages, 366 KB Download PDF

Leakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 156–170, 2022; DOI: 10.25046/aj070216
Abstract:

Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 428 KB Download PDF

Taxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 25–31, 2022; DOI: 10.25046/aj070203
Abstract:

The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
8 Pages, 1,212 KB Download PDF

Hiding Information in DNA Sequence Data using Open Reading Frame Guided Splicing

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 3, Page # 164–171, 2021; DOI: 10.25046/aj060319
Abstract:

Encouraged by the huge publicly available genomic databases, research in the field of steganography was recently extended to utilize DNA sequence data to conceal secret information. As an extension of the work presented earlier by the author, this paper proposes an approach for a secure data communication channel between two parties. At one side of…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,720 KB Download PDF

Enhanced Data Transportation in Remote Locations Using UAV Aided Edge Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 1091–1100, 2021; DOI: 10.25046/aj0602124
Abstract:

In recent years, the applications in the field of Unmanned Aerial Vehicle (UAV) systems has procured research interests among various communities. One of the primary factors being, thinking beyond the box of what could UAV system bring to the table other than military applications? Evidence to any answer for this question is the current day…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Aerospace Engineering (EAR))
Open AccessArticle
12 Pages, 813 KB Download PDF

On the Combination of Static Analysis for Software Security Assessment – A Case Study of an Open-Source e-Government Project

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 921–932, 2021; DOI: 10.25046/aj0602105
Abstract:

Static Application Security Testing (SAST) is a popular quality assurance technique in software engineering. However, integrating SAST tools into industry-level product development and security assessment poses various technical and managerial challenges. In this work, we reported a longitudinal case study of adopting SAST as a part of a human-driven security assessment for an open-source e-government…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
8 Pages, 1,173 KB Download PDF

Using Formal Methods to Model a Smart School System via TLA+ and its TLC Model Checker for Validation

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 821–828, 2021; DOI: 10.25046/aj060295
Abstract:

Formal methods are one of the efficient tools to verify and validate designs for different kinds of systems. Smart systems are attracting researchers’ attention due to the rapid spread of new technologies all over the world. Modeling a smart system requires connecting heterogeneous subsystems together to build it. Our contribution to this work is in…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 583 KB Download PDF

Recording of Student Attendance with Blockchain Technology to Avoid Fake Presence Data in Teaching Learning Process

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 742–747, 2021; DOI: 10.25046/aj060181
Abstract:

University operational activities are a routine part of university operations and supervisory control and monitoring function. The low controlling and monitoring of operational activities can cause irrelevance in the teaching and learning process. A graduate may have a graduation document but has never attended the teaching and learning process. An official institution can issue this…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 811 KB Download PDF

An Enhanced Conceptual Security Model for Autonomous Vehicles

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 853–864, 2020; DOI: 10.25046/aj0506102
Abstract:

Connected and self-driving cars have emerged over the last decade as a leading example of cyber-physical systems, which seek to considerably enhance traffic safety, reduce emissions, decrease costs, and improve efficiency. Google, TESLA, Uber ATG are becoming pioneers in the autonomous vehicles industry. Autonomous vehicles can have a large codebase and with a large volume…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Automation & Control Systems (ACS))
Open AccessArticle
8 Pages, 1,163 KB Download PDF

Multi-Model Security and Social Media Analytics of the Digital Twin

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 323–330, 2020; DOI: 10.25046/aj050639
Abstract:

Digital twins act through application programming interfaces to their physical counterparts to monitor, model, and control them. Beyond these traditional functions of digital twins, they must also act to secure their physical counterparts. A multi-model scheme is presented to help digital twins towards the task of securing the physical system. Additionally, this work includes an…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 568 KB Download PDF

An Overview on CryptDb and Word2vec Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1282–1287, 2020; DOI: 10.25046/aj0505154
Abstract:

Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 1,124 KB Download PDF

Comparative Study of Cryptocurrency Algorithms: Coronavirus Towards Bitcoin’s Expansion

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 452–459, 2020; DOI: 10.25046/aj050556
Abstract:

The widespread presence of Coronavirus (COVID-19) is causing organizations and individuals major economics downsizing. The way this virus is transmitted from one individual to another is the real cause of the problem. For that, researchers in different fields started seriously looking for touch-less and contact-less exchange. Particularly in the finance world, cash transactions and keypad…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
17 Pages, 1,074 KB Download PDF

Detailed Security Evaluation of ARANz, ARAN and AODV Protocols

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 176–192, 2020; DOI: 10.25046/aj050523
Abstract:

Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,240 KB Download PDF

IoT Based Human Activity Recognition System Using Smart Sensors

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 516–522, 2020; DOI: 10.25046/aj050461
Abstract:

Internet of Things provides a virtual view of real-life things by guiding challenges faced by persons in daily life. It is reforming our world with trillions of sensors and other IoT enabled devices by creating a smart environment. Effective use of IoT sensors in various smart IoT applications is very important. After analyzing different sensor…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 663 KB Download PDF

Survey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 374–380, 2020; DOI: 10.25046/aj050443
Abstract:

Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
14 Pages, 2,291 KB Download PDF

Composition of Methods to Ensure Iris Liveness and Authenticity

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 130–143, 2020; DOI: 10.25046/aj050417
Abstract:

In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Bioinformatics (BIF))
Open AccessArticle
5 Pages, 595 KB Download PDF

Ontologic Design of Software Engineering Knowledge Area Knowledge Components

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 30–34, 2020; DOI: 10.25046/aj050404
Abstract:

The article sets forth the solution of the educational resources semantic context knowledge components development task, based on the learning technology project-oriented concepts, graduate’s competency model and ontological; engineering. The being considered ontology model and knowledge display formalisms allow, firstly, relevantly image the educational resources semantic context in the support concepts ontology format, and their…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
5 Pages, 3,811 KB Download PDF

A Novel Quantum No-Key Protocol for Many Bits Transfer with Error Correction Codes

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 781–785, 2020; DOI: 10.25046/aj050298
Abstract:

In this paper, a novel quantum transmission protocol which are based on the quantum no-key protocol is proposed. First, the quantum no-key protocol is discussed to show its important and its non-efficient on data transmission over quantum channel. Then, we improve it to carry many data bits via transmission. In addition, the error correction code…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 787 KB Download PDF

Optimal Flow Analysis of a Unified Energy System with Effects of P2G

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 425–431, 2020; DOI: 10.25046/aj050255
Abstract:

The reformation of energy hubs has significantly augmented the apprehensions about the levels of dependency between different energy sources which often can also be discussed as independent systems conventionally. This research brings focus on the formulation and analysis of an integrated system with bi-directional energy conversions and its effects on the stability of the system…

Read More
(This article belongs to Section Electrical Engineering (ELE))
Open AccessArticle
6 Pages, 883 KB Download PDF

A Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 419–424, 2020; DOI: 10.25046/aj050254
Abstract:

The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
10 Pages, 831 KB Download PDF

Analysis of Cyberattacks in Public Organizations in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 116–125, 2020; DOI: 10.25046/aj050215
Abstract:

It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,496 KB Download PDF

New Color Image Encryption for Medical Images Based on Three Dimensional Generalized Chaotic Cat Map and Combined Cellular Automata

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 104–110, 2020; DOI: 10.25046/aj050213
Abstract:

Medical images are transmitted via the Internet or the hospital intranet which include many important information about the patient’s personal information. Medical image encryption is a technology that can effectively protect the information contained in these medical images. In this paper, we give a secure and trusty Combined Cellular Automata (CoCA) based medical image encryption…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Telecommunications (TEL))
Open AccessArticle
10 Pages, 946 KB Download PDF

Biometric System Vulnerabilities: A Typology of Metadata

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 191–200, 2020; DOI: 10.25046/aj050125
Abstract:

This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 860 KB Download PDF

Evaluation of Classroom Furniture Design for Ecuadorian University Students: An Anthropometry-Based Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 163–172, 2019; DOI: 10.25046/aj040620
Abstract:

It is widely known that students’ exposure to poor postures due to inappropriate classroom furniture design may contribute to the increase of the prevalence of musculoskeletal disorders symptoms that if not identified on time could lead to severe health issues. In this context, due to the unavailability of scientific studies related to this topic in…

Read More
(This article belongs to Section Industrial Engineering (EID))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026