دانلود و نمایش مقالات مرتبط با Cryptography::صفحه 10
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Cryptography

تعداد مقالات یافته شده: 211
ردیف عنوان نوع
91 Device-independent quantum secure direct communication against collective attacks
ارتباط مستقیم امن کوانتومی مستقل از دستگاه در برابر حملات جمعی-2019
‘‘Device-independent” not only represents a relaxation of the security assumptions about the internal working of the quantum devices, but also can enhance the security of the quantum communication. In the paper, we put forward the first device-independent quantum secure direct communication (DIQSDC) protocol and analyze its security and communication efficiency against collective attacks. Under practical noisy quantum channel condition, the photon transmission loss and photon state decoherence would reduce DI-QSDC’s communication quality and threaten its absolute security. For solving the photon transmission loss and decoherence problems, we adopt noiseless linear amplification (NLA) protocol and entanglement purification protocol (EPP) to modify the DI-QSDC protocol. With the help of the NLA and EPP, we can guarantee DI-QSDC’s absolute security and effectively improve its communication quality.
Keywords: Quantum cryptography | Device-independent quantum secure direct | communication | Information security | Communication efficiency
مقاله انگلیسی
92 A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities
مروری بر امنیت سایبری ، حریم خصوصی داده ها و مسائل مربوط به سیاست در استقرار سیستم سایبر فیزیکی در شهرهای هوشمند-2019
Deployments of Cyber Physical Systems (CPSs) in smart cities are poised to significantly improve healthcare, transportation services, utilities, safety, and environmental health. However, these efficiencies and service improvements will come at a price: increased vulnerability and risk. Smart city deployments have already begun to proliferate, as have the upsides, efficiencies, and cost-savings they can facilitate. There are, however, proliferating challenges and costs as well. These challenges include important technical questions, but equally important policy and organizational questions. It is important to understand that these policy and technical implementation hurdles are perhaps equally likely to slow or disable smart city implementation efforts. In this paper, a survey of the theoretical and practical challenges and opportunities are enumerated not only in terms of their technical aspects, but also in terms of policy and governance issues of concern..
Keywords: Smart cities | Cyber security | Government policy making | Cryptography | Security and privacy | Authentication
مقاله انگلیسی
93 A survey on internet of vehicles: Applications, security issues & solutions
بررسی اینترنت وسایل نقلیه: برنامه ها ، مسائل امنیتی و راه حل ها-2019
Internet of Vehicles (IoV) is an emerging concept in intelligent transportation systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet of Things (IoT). IoV has dominated the transportation systems due to numerous special traits like dynamic topological structures, huge network scale, reliable internet connection, compatibility with personal devices and high processing capability, etc. In this review, an in-depth survey of IoV is carried out by discussing the applications of IoV in different areas, as well as the comparative study of IoV and VANETs, is being done. Intelligent transportation system involves a huge amount of dynamic real-time critical data so its security is a major concern. Different security aspects of IoV are studied in this review which includes security requirements, security challenges, and security attacks. After this, existing security solutions of all attacks are elaborated and discussion section is provided to highlight the drawbacks of security solutions deployed for each attack as well as it emphasizes on the attacks for which no security solutions are available. Based on the extensive study conducted on this, it has been found that existing security solutions use conventional cryptographic techniques that affect the performance of the delay sensitive network i.e. IoV and VANETs. So, a lightweight authentication protocol for RFID (Radio-Frequency Identification devices) has also been proposed to overcome the drawbacks of existing solutions and to provide better performance in terms of low detection time, low CPU and memory consumption to strengthen the existing IoV environment.
Keywords: Attacks | Applications | Cryptography | Internet of Vehicles (IoV) | Security | VANETs
مقاله انگلیسی
94 Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization
ارزیابی چابکی رمزنگاری مقاوم به کوانتومی در مسیریابی و تعویض زیرساخت های شبکه IT در یک سازمان مالی با اندازه بزرگ-2019
This paper provides exploratory research by determining the impact of quantum computing threat on modern routing and switching infrastructure components of IT network infrastructure in a large-size fi- nancial organization. We determine whether common routing and switching IT network infrastructure, including its hardware and software components, have enough cryptographic agility to accommodate the change of cryptographic algorithms to the ones that do not exhibit vulnerability to quantum computing and to the ones that are compliant with National Security Agency (NSA) Suite B set of protocols. We pinpoint upstream or downstream impacts of a change in the encryption algorithms across various IT network infrastructure components in terms of effort required to accomplish this transition. This study is among the first studies that investigate quantum-resistance cryptographic from the hard- ware perspectives of routing and switching technologies using diffusion of innovation theory. The study integrates enterprise governance to meet the challenges presented by quantum-computing with a focus on cryptographic agility. We offer an enterprise architecture framework for assessing the dependencies, costs, and benefits of IT infrastructure migration plan to meet the future challenges of quantum-resistant cryptographic. The analysis in this research can be used by IT managers to pre-plan for an upgrade of routing and switching infrastructure, assist in estimating the effort s required to perform these upgrades, and assist in selecting a vendor of routing and switching equipment from the perspective of cryptographic agility. With today’s supercomputers, a computational task involved in breaking modern asymmetric cryptographic algorithms would be infeasible due to the required computational complexity. However, with progress in the devel- opment of quantum computing technology, firms are facing an increasing risk of potential security threats to existing encrypted data and secured transmission channels as the processing power of quantum com- puters continue to increase.
Keywords: Quantum-resistance | Cryptography | Routing and switching | Enterprise architecture | IT governance
مقاله انگلیسی
95 Secure telemedicine using RONI halftoned visual cryptography without pixel expansion
تله پزشکی امن با استفاده از رمزنگاری بصری نیمه تمام RONI بدون گسترش پیکسل-2019
To provide quality healthcare services worldwide telemedicine is a well-known technique. It delivers healthcare services remotely. For the diagnosis of disease and prescription by the doctor, lots of infor- mation is needed to be shared over public and private channels. Medical information like MRI, X-Ray, CT-scan etc. contains very personal information and needs to be secured. Security like confidentiality, privacy, and integrity of medical data is still a challenge. It is observed that the existing security tech- niques like digital watermarking, encryption are not efficient for real-time use. This paper investigates the problem and provides the solution of security considering major aspects, using Visual Cryptography (VC). The proposed algorithm creates shares for parts of the image which does not have relevant infor- mation. All the information which contains data related to the disease is supposed to be relevant and is marked as the region of interest (ROI). The integrity of the image is maintained by inserting some information in the region of non-interest (RONI). All the shares generated are transmitted over different channels and embedded information is decrypted by overlapping (in XOR fashion) shares in θ(1) time. Visual perception of all the results discussed in this article is very clear. The proposed algorithm has per- formance metrics as PSNR (peak signal-to-noise ratio), SSIM (structure similarity matrix), and Accuracy having values 22.9452, 0.9701, and 99.8740 respectively.
Keywords: Error diffusion | Halftone | RONI | Telemedicine | Visual cryptography
مقاله انگلیسی
96 A secure authentication protocol for wearable devices environment using ECC
پروتکل احراز هویت مطمئن برای محیط دستگاه های پوشیدنی با استفاده از ECC-2019
One of the challenging issues in wearable devices environment is to provide a secure communication. User authentication is a mechanism which is used to provide the secure communication in this envi- ronment. In this paper, we propose an authentication protocol for wearable devices environment using elliptic curve cryptography (ECC). We analyze the formal security of our scheme using random oracle model and discuss its informal security analysis to show that it is resistant to various known attacks. We formally verify its security using the ProVerif tool. Our scheme performs better than the existing related schemes in terms of security features and communication cost.
Keywords: Authentication | Wearable devices | Denial of service attack | Session key | Mobile terminal stolen attack | ECC
مقاله انگلیسی
97 An efficient code-based threshold ring signature scheme
یک طرح امضای حلقه آستانه مبتنی بر کد-2019
Code based cryptography is a powerful and a promising alternative to the number theoretic cryptography as it is supposed to resist to the quantum computer. The migration to the post quantum hypothetical world requires the design of all the most important cryptographic primitives such as signature schemes. For this reason, we propose in this paper a ring signature and a threshold ring signature schemes that are based on coding theory assumptions. In the case of threshold ring signature scheme, we have a subset of users belonging to a group of users called a ring who collaborate in order to produce a signature on behalf of ring members while maintaining the anonymity of the identity of the real signers. In this paper, we use the AGS identification scheme, which is a coding theory zero-knowledge authentication protocol, to produce a ring signature and a threshold ring signature. By comparing our schemes with the best one in performance so far on 80 bits security level, we find an average 86% reduction of the signature size and also a reduction on the public key length at equivalent security level. The reduction is achieved for different values of the number of signers and ring’s size.
Keywords: Ring signature | Threshold ring signature | Code-based cryptography | AGS identification scheme | Post-quantum | Zero-knowledge
مقاله انگلیسی
98 An efficient colour image encryption scheme based on 1-D chaotic maps
یک طرح رمزگذاری کارآمد تصویر بر اساس نگاشت های هرج و مرج 1 بعدی-2019
Nowadays, internet is the medium through which people are sharing digital images. However, security is an issue in sharing of those images. Encryption techniques play an important role for the security of images. In this paper, an efficient colour image encryption scheme is proposed using multiple piece-wise linear chaotic map (PWLCM) systems. The proposed scheme first performs two-times multi-way block- based rotational permutation operations and then row-column rotational permutations. Finally, it per- forms row, column, and block diffusion operations. This scheme is simple and secure because it involves only simple rotational permutation operations using only PWLCM systems. Also, this scheme is efficient because it requires less computations and less simulation time to encrypt colour images. The advantages of this scheme are high key space, high security, simplicity and high efficiency in terms of computational complexity and simulation time. The simulation outputs and the security analyses indicate that the pro- posed method has better performance in terms of encryption efficiency, security, and resistivity for most of the common attacks.
Keywords: Security | Chaotic cryptography | Colour image encryption | Rotational permutation operation | PWLCM system | Efficiency | Key space
مقاله انگلیسی
99 A highly robust and secure image watermarking based on classification and visual cryptography
علامت تصویری بسیار مستحکم و مطمئن بر اساس طبقه بندی و رمزنگاری بصری-2019
In this paper a new robust image watermarking algorithm based on blocks classification and visual cryp- tography (VC) is presented. First the original image is decomposed into non-overlapping blocks. Then, we use canny edge detection and the support vector machine (SVM) classification method to categorize these blocks into smooth and non-smooth classes. The VC technique is used to generate two image shares: A master share that is constructed according to the block classification results and an owner share gener- ated by using the master share together with a binary watermark. To verify the ownership of the image, the watermark can be retrieved by stacking the master share and the owner share. By skipping blocks which are not robust against attacks, the robustness of our proposed watermarking method is signifi- cantly improved. Our method is completely imperceptible because the watermark pattern is concealed without modifying the original host image.
Keywords: Image watermarking | Visual cryptography | Image blocks classification | Support vector machine | Robust blocks
مقاله انگلیسی
100 Improved Cohort Intelligence: A high capacity, swift and secure approach on JPEG image steganography
بهبود هوش گروهی: رویکردی با ظرفیت بالا ، سریع و ایمن در استگانوگرافی تصویر JPEG -2019
In the recent high level of information security was attained by combining the concepts of cryptogra- phy, steganography along with the nature inspired optimization algorithms. However, in today’s world computational speed plays a vital role for the success of any scientific method. The optimization algo- rithms, such as cohort Intelligence with Cognitive Computing (CICC) and Modified-Multi Random Start Local Search (M-MRSLS) were already implemented and applied for JPEG image steganography for 8 ×8 as well as 16 ×16 quantization table, respectively. Although results were satisfactory in terms of image quality and capacity, the computational time was high for most of the test images. To overcome this challenge, the paper proposes modified version of cohort intelligence (CI) algorithm referred to as Im- proved Cohort Intelligence (CI). The Improved CI algorithm was considered as a cryptography technique and implemented to generate optimized cipher text. Improved CI algorithm was further employed for JPEG image steganography to propose a reversible data hiding scheme. Experimentation was done on grey scale image, of size 256 ×256; both for 8 ×8 and 16 ×16 quantization table. Results validation of the proposed work exhibited very encouraging improvements in the computational cost
Keywords: Information security | Cryptography | Steganography | JPEG compression | Grey scale image | Improved CI
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5917 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 40184 :::::::: افراد آنلاین: 54