با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
CREASE: Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy in VANETs
CREASE: طرح احراز هویت مبتنی بر نام مستعار بدون گواهی و استفاده مجدد برای فعال کردن امنیت و حریم خصوصی در VANET-2022 Due to the customers’ growing interest in using various intelligent and connected devices, we
are surrounded by the Internet of Things (IoT). It is estimated that the number of IoT devices
will exceed 60 billion by 2025. One of the primary reasons for such rapid growth is the Internet
of Vehicles (IoV). Internet of Vehicles (IoV) has evolved into an emerging concept in intelligent
transportation systems (ITS) that integrates VANETs and the IoT to enhance their capabilities.
With the emergence of IoV and the interest shown by customers, Vehicular Ad hoc NETworks
(VANETs) are likely to be widely deployed in the near future. However, for this to happen, wide
participation of vehicle owners in VANET is needed. The primary concerns of vehicle owners
to participate in VANET are privacy and security. In this paper, we present a Certificateless and
REused-pseudonym based Authentication Scheme for Enabling security and privacy (CREASE) in
VANETs. One of the ways to preserve the privacy of vehicles/drivers is to allow vehicles/drivers
to use pseudo identities (pseudonyms) instead of their real identities (such as VIN number or
driving license number) in all communications. The pseudonym used by a vehicle needs to
be changed frequently to prevent the vehicle from being tracked. Our scheme uses Merkle
Hash Tree and Modified Merkle Patricia Trie to efficiently store and manage the pseudonyms
assigned to a vehicle. This enables a vehicle to pick and use a random pseudonym from a
given set of pseudonyms assigned to it as well as change its pseudonym frequently and securely
to ensure privacy. Unlike many of the existing schemes, our scheme does not use certificates
and certificate revocation lists for authentication. Moreover, it allows vehicles to get a set of
pseudonyms only once from the trusted authority. We present a formal proof of correctness of
our scheme and also compare our scheme with some of the other contemporary schemes to
show the effectiveness of our scheme.
Keywords: VANETs | Intelligent transportation systems | Authentication | Security | Privacy-preserving authentication |
مقاله انگلیسی |
2 |
The rise of psychological physicians: The certification of insanity and the teaching of medical psychology
ظهور پزشکان روانشناس: گواهی جنون و آموزش روانشناسی پزشکی-2020 This paper investigates the nexus between the legal provisions for the certification of insanity and the intro- duction of psychological medicine into British medical education. Considering legal and published sources, it shows that the 1853 Lunatic Asylums Act proved fundamental for the promotion of medical psychology as part of medical training. By giving doctors the authority to report “facts of insanity”, this law created the need for “psychological physicians” capable of certifying lunacy. I explore this connection in three sections. First, I introduce the emergence of medical certificates in the context of asylum committal. Second, I focus on the certification procedure introduced in 1853 which required “facts of insanity personally observed”. Third, I consider how British asylum doctors advocated for the diffusion of psychological medicine as an essential university subject for certifying practitioners. This paper emphasizes the relevance of confinement legislation in the development of psychiatry as a medical specialty. Keywords: Certification | Asylum | Confinement | Education | Expertise | Law |
مقاله انگلیسی |
3 |
Considering sustainability in cruise vessel design and construction based on existing sustainability certification systems
با توجه به پایداری در طراحی و ساخت کشتی های کروز بر اساس سیستم های صدور گواهینامه پایداری موجود-2020 Interest towards sustainability in cruise industry has increased during recent years. This article focuses in
the ship design and construction phase and what sustainability indicators can be collected e and
adapted - from certification systems in other sectors. Certificates in land-based construction and hospitality
sectors, as well as a general reporting scheme called Global Reporting Initiative (GRI), serve as a
benchmark in this study. The indicators that can be collected already during the design and construction
phase are categorized, the categories are linked to the phase in which the indicators have effect on, and
the applicability of each category for cruise industry is considered. The certificates for land-based construction
are more detailed than GRI and more thorough than certificates in hospitality sector. From the
indicators affecting design and construction phase, indicators in general management of the project,
material selection and waste management categories can be utilized in cruise industry similarly to existing
sustainability systems. While social sustainability is seen important in cruise industry, in land-based
construction sector the social sustainability indicators are scarce, whereas GRI or even hospitality
sector certificates have more comprehensive set of indicators. In indicators affecting the operation time,
modification and additions are required before usage in cruise industry. The environmental effects should
be redefined taking into account especially the air pollution and waste management. In well-being effects
and encouraging sustainable lifestyle there are plenty of unsuitable indicators due to the operational
environment, but new indicators could be developed on the crew premises. Building efficiency and
commissioning are suitable for cruise industry. Although there are only a few indicators affecting the
deconstruction phase, they can be considered suitable. Keywords: Sustainability | Cruise industry | Certificate | Indicator |
مقاله انگلیسی |
4 |
Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems
برون سپاری مبتنی بر پروکسی مبتنی بر هویت با ممیزی عمومی در سیستم های سایبر فیزیکی پزشکی مبتنی بر ابر-2019 Cloud-based medical cyber–physical system (MCPS) relies on cloud computing to provide
powerful data storage and computing services. Based on the vital outsourced medical
data, doctors can perform precise medical diagnosis for patients, thus the integrity
verification of medical data has become increasingly important. In this paper, we propose
an identity-based proxy-oriented outsourcing with public auditing scheme in cloudbased
MCPS using elliptic curve cryptography. Our scheme enables a patient to authorize
the proxy to generate and upload the signatures of medical data and corresponding
encrypted medical data to cloud-based MCPS. Any third party auditor (TPA) can audit
the medical data efficiently, without retrieving the entire medical data set. We provide
the security proof of the proposed scheme, including the storage correctness guarantee
and proxy-oriented privacy-preserving property. Moreover, our scheme is designed
on identity-based systems, which can avoid complex certificates management. The
efficiency comparison shows that our scheme is much more light-weight, and more
suitable in cloud-based MCPS. Keywords: Cloud computing | Identity-based proxy-oriented outsourcing | Medical cyber–physical system | Elliptic curve cryptography | Public auditing |
مقاله انگلیسی |
5 |
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy
تجزیه و تحلیل دقیق و بهبود ممیزی عمومی مبتنی بر هویت کارآمد و ایمن برای داده های برون سپاری پویا با پروکسی-2019 For data owners of restricted cloud access with a delegated proxy, public auditing technology for cloud data integrity, plays critical roles in ensuring powerful productivity that flexible cloud services provide for their business. In order to address the scalability of data owners and storage clouds for secure public auditing, Yu et al. (2017) proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019), which also overcomes complicated public key certificates management issue. In this article, we figure out that this scheme is vulnerable to data loss attack where clouds could pass integrity auditing without original data. Meanwhile, a threat of system security is demonstrated, i.e., any entities are able to recover proxy private keys and impersonate proxy to forge proxy tag, with two arbitrary data tag pairs of same data owner. To enable secure identity-based batch public auditing with proxy processing, we propose an improved scheme without these security flaws and prove its security under CDH hard problem in the random oracle model. With complexity anal- ysis, our scheme shows better efficiency over identity-based proxy-oriented data uploading and remote data integrity checking in public cloud (ID-PUIC) in a single owner effort on a single cloud. Especially, we give the detailed analysis for how efficiently the attacks on Yu et al.’s scheme could be launched with an experiment, and demonstrate complete reduction on probability and time for proving security of our improved scheme. For potential application in big data storage, we first evaluate the error detection probability varying on number of auditing blocks, and then conduct detailed performance analysis by simulating our scheme and ID-PUIC scheme on the different number of data owners and storage clouds, with up to 10 6 data blocks Keywords: Cloud storage | Proxy | Public data auditing | Identity-based cryptography | Provable security |
مقاله انگلیسی |
6 |
Another look at TLS ecosystems in networked devices vs: Web servers
نگاهی دیگر به اکوسیستم های TLS در دستگاه های تحت شبکه در مقابل سرورهای وب-2019 High-speed IPv4 scanners, such as ZMap, now enable rapid and timely collection of TLS
certificates and other security-sensitive parameters. Such large datasets led to the devel-
opment of the Censys search interface, facilitating comprehensive analysis of TLS deploy-
ments in the wild. Several recent studies analyzed TLS certificates as deployed in web
servers. Beyond public web servers, TLS is deployed in many other Internet-connected devices,
at home and enterprise environments, cyber physical systems, and at network back-
bones. In April 2017, we reported the results of a preliminary analysis based on measure-
ment data of TLS deployments in such devices (e.g., routers, modems, NAS, printers, SCADA,
and IoT devices in general) collected in Oct. 2016 using Censys. We also compared certificates
and TLS connection parameters from a security perspective, as found in common devices
against top Alexa sites. Censys has evolved since then and its data volume has increased
with the addition of several new device types. In this paper, we perform a similar but more
comprehensive measurement study to assess TLS vulnerabilities in devices, and compare
our current results with our 2016 findings, showing how such systems have evolved in the
last one and half year. Indeed, there are noticeable improvements in the TLS ecosystem for
devices, especially in terms of adoption of TLS itself (from 29.4% in 2016 to 73.7% in 2018)
and stronger cryptographic primitives. However, we also note the continuity of significant
weaknesses in devices for which immediate remediation is warranted (e.g., the use of known
private keys, SSLv3, MD5-RSA, and RC4). We have also contacted the top manufacturers of
vulnerable devices to convey our findings. Most of them blamed users for not updating their
devices with latest firmware images that apparently would mitigate the reported findings. Keywords:CPS | IoT | SCADA | TLS | Certificates | Cryptographic primitives |
مقاله انگلیسی |
7 |
Lightweight and escrow-less authenticated key agreement for the internet of things
قرارداد کلیدی معتبر سبک و بدون اعتبار برای اینترنت اشیاء -2017 Security is essential for wide wireless sensor network (WSN) deployments, such as the Internet of Things
(IoT). However, the resource-constrained nature of sensors severely restricts the cryptographic algorithms
and protocols that can be used in such platforms. Such restrictions apply especially to authenticated
key agreement (AKA) protocols for bootstrapping keys between authorized nodes: in traditional net
works, such schemes involve the transmission of quite large certificates and the execution of memory
and processing-intensive cryptographic algorithms, which are not suitable for WSNs. Whereas lightweight
WSN-oriented schemes also exist, most of them focus on small deployments where key-escrow is possible
(i.e., a fully trusted authority knows the private keys of all nodes). Aiming to identify AKA solutions suit
able for the IoT scenario, in this article we assess lightweight and escrow-free schemes, evaluating their
security and performance in terms of processing time and energy consumption in the TelosB platform.
Besides proving that some very efficient schemes are actually flawed, we show that the combination of
SMQV (strengthened-Menezes-Qu-Vanstone) with implicit certificates leads to a secure and lightweight
AKA scheme.
Keywords: Security | Authenticated key agreement | Sensor networks | Internet of things |
مقاله انگلیسی |
8 |
Distributed controllers multi-granularity security communication mechanism for software-defined networking
کنترل کننده های توزیع کننده مکانیسم ارتباطات امنیتی چند منظوره برای شبکه های تعریف شده توسط نرم افزار-2017 For the multi-domain software defined network (SDN), different controllers are not able to
directly communicate with each other due to the different distances among control planes.
Therefore, the exchange of information among different domains is generally unsecure. The
main contribution of this paper can be summarized into two parts. Firstly, architecture of
multi-granularity security controller is proposed, which includes a basic control module
and a multi-granularity security customized module. Secondly, a secure communication
mechanism is proposed for distributed controller, where a prototype of this mechanism is
implemented. In particular, this mechanism can make use of the border switch as inter
domain agents, where special packets are used by the controller to send messages to the
secure tunnel. A two-step authentication of the controller can be provided by inter-domain
agents and digital certificates. The experimental results demonstrate that the distributed
controller secure communication mechanism is capable of effectively improving the secu
rity of SDN domain.
Keywords: Software defined network | Security architecture | Secure communication |
مقاله انگلیسی |
9 |
گردشگری روغن زیتون: ارتقای توسعه روستایی در اندلس (اسپانیا)
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 33 غذاهای دارای گواهی کیفیت، هرچه بیشتر درحال به دست آوردن جایگاه در رژیم غذایی مردم هستند. هر روز بیش از یک تقاضا برای بازدید از تاسیسات تولید جهت یاد گرفتن اینکه چگونه محصولات غذایی ساخته می شوند و برای نمونه گیری از آنها، وجود دارد. این محصولات شامل روغن زیتون می شود، یک محصول نمونه از اسپانیا (اسپانیای جنوبی). هدف این مطالعه تحلیل این است که گردشگری روغن زیتون چه چیزی باید در این منطقه ارائه دهد. یک ارزیابی روی شرکتهای تولید مواد غذایی روغن زیتون و اسم و منشأ اصلی آنها به منظور تعیین درجه دخیل بودن آنها در توسعه محصول گردشگری در "گردشگری روغن زیتون" انجام شد. سهم اصلی این مطالعه این است که اولین تحلیل روی منشأ چندین شرکت روغن زیتون از سراسر اسپانیا می باشد و به دنبال هم افزایی با دیگر جریان های غذایی در منطقه می باشد که می تواند تقاضاهای بازدید کنندگان و همچنین سطح توسعه و ثروت را در این ناحیه افزایش دهد.
کلیدواژه ها: گردشگری روغن | توسعه روستایی | نشان محفوظ اصل | آشپزی | اسپانیا | برداشت های گردشگر |
مقاله ترجمه شده |
10 |
Exploring the Information Asymmetric factors of Pledges of Warehouse Certificates Based on Internet of Things
بررسی عوامل نامتقارن اطلاعات تعهد گواهی انبار داده ها بر اساس اینترنت اشیاء -2017 In internet plus era, the establishment of information platform is the way to solve the problem of asymmetric way. However
Internet plus should not focus on the Internet as a tool to solve the problem, but on the nature of the problem to be solved. The
nature of information sharing platform of pledges of warehouse certificates is to strengthen supervision and improve management.
Study on the influence factors to construct the system information is the premise of constructing information sharing platform.
The paper researches the factors that cause asymmetry information in the process of pledges of warehouse certificates business
with the use of exploratory factor analysis on collecting questionnaires which was designed about asymmetry information of
pledges of warehouse certificates based on the literature analysis and expert investigation. The research shows, there are four
kinds of factors which cause information asymmetry in the process of pledges of warehouse certificates business. They are about
the pledged goods, financing of enterprises, administrative agencies, and other warehouse receipt pledge business social agencies.
|
مقاله انگلیسی |