با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Anonymous Quantum Sealed-Bid Auction
مزایده کوانتومی مهر و موم شده-بید ناشناس-2022 In this brief, we present a novel quantum protocol
for sealed-bid auction and design the corresponding quantum
circuits. In the proposed protocol, we introduce two auction-
eers to ensure that they can supervise each other, where one is
a classical auctioneer, and the other is a quantum auctioneer.
Furthermore, we turn sealed-bid auction into secure multiparty
summation by employing the Chinese Remainder Theorem to
achieve the anonymity. Compared with the related protocols,
the proposed protocol can meet more security properties, e.g.,
anonymity, fairness, verifiability, secrecy and non-repudiation. Index Terms—Quantum Internet | quantum circuits | sealed-bid auction | secure multiparty summation. |
مقاله انگلیسی |
2 |
Provably secure biometric-based client–server secure communication over unreliable networks
ارتباطات امن مشتری و سرور مبتنی بر بیومتریک به طور قابل اطمینان در شبکه های غیرقابل اعتماد-2021 Due to rapid advancement in internet technologies, remote client access has become much more comfortable than in previous days. The responsibility of the system does not limit even after providing access to resources. In every system, there is a possibility that an adversary may use the resources of the system without prior authentication. This will create interruption, and the clients of the system will ultimately be affected, so the system must provide some authentication mechanism. Therefore, an authentication scheme needs to be introduced, which provides security against different attacks. Consequently, in this article, we propose a reliable and secure three factor authentication scheme that prevents various security attacks. The provable security of the proposed scheme is proved through a widely used random oracle model. We implemented the cryptographic operations of proposed and related schemes on a desktop system having good specifications to get the experimental results. Moreover, the presented scheme is compared with the existing schemes to compare its performance. The performance evaluation shows that our scheme is lightweight and efficient in terms of computation and communication costs as compared to related competing schemes. Keywords: Anonymity | Authentication | Impersonation attack | Session key | Smartcard |
مقاله انگلیسی |
3 |
A Methodology For Large-Scale Identification of Related Accounts in Underground Forums
یک روش برای شناسایی در مقیاس بزرگ حساب های مرتبط در انجمن های زیرزمینی-2021 Underground forums allow users to interact with communities focused on illicit activities.
They serve as an entry point for actors interested in deviant and criminal topics. Due to the
pseudo-anonymity provided, they have become improvised marketplaces for trading illegal
products and services, including those used to conduct cyberattacks. Thus, these forums
are an important data source for threat intelligence analysts and law enforcement. The use
of multiple accounts is forbidden in most forums since these are mostly used for malicious
purposes. Still, this is a common practice. Being able to identify an actor or gang behind
multiple accounts allows for proper attribution in online investigations, and also to design
intervention mechanisms for illegal activities. Existing solutions for multi-account detec-
tion either require ground truth data to conduct supervised classification or use manual
approaches. In this work, we propose a methodology for the large-scale identification of re-
lated accounts in underground forums. These accounts are similar according to the distinc-
tive content posted, and thus are likely to belong to the same actor or group. The methodol-
ogy applies to various domains and leverages distinctive artefacts and personal information
left online by the users. We provide experimental results on a large dataset comprising more
than 1.1M user accounts from 15 different forums. We show how this methodology, com-
bined with existing approaches commonly used in social media forensics, can assist with
and improve online investigations.
© 2021 Elsevier Ltd. All rights reserved. keywords: رسانه های اجتماعی قانونی | انجمن های زیرزمینی | اندازه گیری در مقیاس بزرگ | حساب های مرتبط | سایبری | Social media forensics | Underground forums | Large-Scale measurement | Related accounts | Cybercrime |
مقاله انگلیسی |
4 |
Self-reported motivations for engaging or declining to engage in cyber-dependent offending and the role of autistic traits
انگیزه های خوداظهاری برای درگیر شدن یا کاهش مشارکت در جرم وابسته به فضای مجازی و نقش صفات اوتیسم-2020 Cyber-dependent offending, i.e. criminal behaviour reliant on computing and the online domain,
has been reportedly associated with particular characteristics and motivations such as being
young, male, autistic and motivated by challenge. These associations are anecdotal however and
empirical evidence is limited. The present study investigated reasons for engaging or declining to
commit cyber-dependent offending in cyber-skilled non-offenders (n=175) and offenders
(n=7) via an online survey measuring cyber-dependent criminality. The potential role of autism
and autistic traits was also considered. Qualitative interviews about motivations for offending
were carried out with the offenders. The cyber-dependent offenders reported seven main reasons
for engaging in cyber-dependent offending: (1) lack of understanding; (2) entertainment; (3) peer
influence; (4) experience and career; (5) anonymity and risk perception; (6) life events; and (7)
morals. Twenty-nine (approximately 17 %) of the non-offenders had been asked to engage in
cyber-dependent offending but had declined. Their reasons and motivations for declining to
commit cyber-dependent offences were compared with the cyber-dependent offenders reasons
and motivations for engaging in cybercrime. Seven main reasons for declining to offend were
identified: (1) moral principles; (2) perception of risk; (3) fear of consequences; (4) not wanting
to; (5) wanting to adhere to the law; (6) behaviour being too complicated; and (7) price being too
low. Implications for practise are discussed. Keywords: Offending | Autistic traits | Autism | Cyber-dependent offending | Cybercrime | Motivations |
مقاله انگلیسی |
5 |
Runtime verification for business processes utilizing the Bitcoin blockchain
تأیید زمان اجرا برای فرآیندهای تجاری با استفاده از بلاکچین بیت کوین-2020 The usage of process choreographies and decentralized Business Process Management Systems has been named as an alternative to centralized business process orchestration. In choreographies, control over a process instance is shared between independent parties, and no party has full control or knowledge during process runtime. Nevertheless, it is necessary to monitor and verify process instances during runtime for purposes of documentation, accounting, or compensation.To achieve business process runtime verification, this work explores the suitability of the Bitcoin blockchain to create a novel solution for choreographies. The resulting approach is realized in a fully- functional software prototype. This software solution is evaluated in a qualitative comparison. Findings show that our blockchain-based approach enables a seamless execution monitoring and verification of choreographies, while at the same time preserving anonymity and independence of the process participants. Furthermore, the prototype is evaluated in a performance analysis.© 2017 Elsevier B.V. All rights reserved. Keywords: Choreographies | Blockchain | Business process management | Runtime verification |
مقاله انگلیسی |
6 |
The Dark Web and cannabis use in the United States: Evidence from a big data research design
استفاده از وب تاریک و حشیش در ایالات متحده: شواهدی از طراحی تحقیقات داده های بزرگ-2020 Background: Cannabis is one of the most commonly sold drugs on cryptomarkets. Because of the anonymitygranting
functions of Tor, no study has traced the within-country effect of the Dark Web on cannabis consumption
patterns. This article uses a big data research design to examine the association between revealed
interest in the Dark Web and self-reported cannabis use within US states from 2011 when Silk Road launched to
2015 when Operation Onymous shuttered nine markets.
Methods: This study uses mixed effects ordinary least squared regressions to analyze U.S. state/year panel data,
using robust standard errors to correct for heteroscedasticity. Marginal effect plots illustrate substantive effects.
The dataset consists of state-level variables drawn from the Uniform Crime Report (UCR), the American
Community Survey (ACS), the National Survey on Drug Use and Health, the Correlates of State Policy Project,
and the Bureau of Justice Statistics Justice Expenditure and Employment Extracts. Data for the Dark Web interest
measure are drawn from Google Trends. The proxy for Dark Web interest is an index of eight Dark Web related
search queries.
Results: The regression analysis indicates that Dark Web interest in US states positively correlates with cannabis
consumption rates overall and among older adults (26+), but not youth (12–17) or younger adults (18–25).
Additionally, Dark Web interest is positively associated with more frequent cannabis usage rates (i.e. use in the
past month, excluding first time use) both overall and among older adults, but not among youth or younger
adults. Dark Web interest does not correlate with casual use (i.e. use in the last year, excluding use in the past
month) for any age bracket. Interacting Dark Web interest with state-level legalization regimes indicates that the
association between Dark Web interest and cannabis consumption in the past year is no different in medically
legalized states and amplified in states with recreational legalization. Lastly, the Dark Web interest term does not
correlate with first time cannabis either overall or for any age category.
Conclusions: Interest in the Dark Web is associated with increased cannabis use in U.S. states from 2011–2015,
but the effect is concentrated in states with more frequent cannabis users, older users, and in states with recreational
legalization of cannabis. Keywords: Dark web | Cryptomarkets | Cannabis | Silk Road | Google Trends | Cannabis Legalization |
مقاله انگلیسی |
7 |
Leakage-resilient ring signature schemes
طرح های امضای حلقه انعطاف پذیر نشت-2019 Ring signature schemes provide a way to sign a message without exposing the identity of authentic signer. Security of ring signature assumes that the signing keys are perfectly secret. On account of the physical imperfection of cryptosystems in practice, however, malicious attackers can easily learn partial secret information of the system by means of side-channel attacks, thus breaking the security. To overcome this problem, Wang et al. introduced the notion of leakage-resilient ring signature and presented a concrete construction. However, their scheme is only provably secure in the random oracle model and can tolerate at most (1/2 −1/2t−)part leakage of the secret signing key, where tis the ring size. In this work, we focus on the constructions of leakage-resilient ring signature based on bounded leakage model, and combine Bender et al.’s security definitions of traditional ring signature with bounded leakage resilience, which is stronger than that considered in Wang et al.’s work. We then propose three constructions of leakage-resilient ring signature secure under the given security models. The first one is a black-box construction, and the second one is a concrete construction with leakage bound((n −2) logq −ω(logk))whose security is reduced to the intractability of computational Diffie–Hellman problem and leakage-resilient hard relation without random oracles. The third construction enjoys better efficiency and higher leakage bound, e.g. ((n −1) logq −ω(logk)), but its security proof resorts to the random oracle model. Keywords: Ring signature | Anonymity | Black-box construction | Leakage-resilient cryptography |
مقاله انگلیسی |
8 |
A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
پروتکل احراز هویت متقابل منحنی بیضوی امن برای TMIS با کمک ابر-2019 With the fast progress of network communication, its technologies and the developing popularity
of telecare medical information system (TMIS), doctors provide treatment to patients via Internet
without visiting hospitals. By using mobile device, wireless body area network and cloud based
architecture, the patients can gather their physiological information and upload to cloud via their
mobile devices. The authenticated doctor provides online treatment to patient at anytime and
anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication
and authenticated to all the participants before assessing this system. Recently Li
et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS.
They believed that their scheme secure against all well-known privacy and security attributes. In
the proposed work, we reviewed Li et al. authentication protocol and found that it has various
security flaws like as message authentication fails in healthcare center upload phase, session key
is not possible in healthcare center upload phase, impersonation attack in patient data upload
phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in
similar environment. The proposed protocol secure against man-in-the-middle attack, patient
anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation,
message authentication, impersonation attack, session key security and patient unlinkability.
We compared the proposed protocol with existing related protocols in same cloud based
TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the
efficiency in terms of computation and communication costs for cloud-assisted TMIS. Keywords: Cloud computing | Elliptic curve cryptography | TMIS | Medical data | Mutual authentication |
مقاله انگلیسی |
9 |
Thou shalt not steal: Taking aversion with legal property claims
دزدی نکن: نفرت گریزی با ادعای مالکیت قانونی-2019 Do people have an innate respect for property? In the literature, there is controversy about
whether human subjects are taking averse. We implemented a dictator game with a symmetric
action space to address potential misconceptions and framing and demand effects that may be
responsible for the contradictory findings. Misconceptions can occur as a result of unclear
property rights, while framing and demand effects can occur if anonymity is not preserved. Our
paper is the first to implement both a strict double-blind anonymity protocol and clear property
rights. We established clear property claims by asking subjects in our legal treatment to bring
their own property to the experiment. In the effort treatment, the experimenter transferred the
property publicly to subjects after they completed a real effort task. Our data suggest that without
social enforcement, respect for property is low. Yet, the taking rate significantly differs from the
theoretically predicted maximum. Consistent with the Lockean theory of property, respect for
property grows when the entitlement is legitimized by the labor the owner had to invest to
acquire it. Keywords: Property rights | Taking aversion | Dictator game | Symmetric action space | Double-blind anonymity | Earned entitlements | Tangibility |
مقاله انگلیسی |
10 |
A survey on privacy protection in blockchain system
مروری بر حفاظت از حریم خصوصی در سیستم بلاکچین-2019 Blockchain, as a decentralized and distributed public ledger technology in peer-to-peer network, has received
considerable attention recently. It applies a linked block structure to verify and store data, and applies the
trusted consensus mechanism to synchronize changes in data, which makes it possible to create a tamper-proof
digital platform for storing and sharing data. It is believed that blockchain can be utilized in diverse Internet
interactive systems (e.g., Internet of Things, supply chain systems, identity management, and so on). However,
there are some privacy challenges that may hinder the applications of blockchain. The goal of this survey is
to provide some insights into the privacy issues associated with blockchain. We analyze the privacy threats
in blockchain and discuss existing cryptographic defense mechanisms, i.e., anonymity and transaction privacy
preservation. Furthermore, we summarize some typical implementations of privacy preservation mechanisms in
blockchain and explore future research challenges that still need to be addressed in order to preserve privacy
when blockchain is used. Keywords: Privacy | Anonymity | Blockchain | Cryptography | Cryptocurrency |
مقاله انگلیسی |