دانلود و نمایش مقالات مرتبط با Cryptography::صفحه 9
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Cryptography

تعداد مقالات یافته شده: 211
ردیف عنوان نوع
81 An efficient privacy-preserving protocol for database-driven cognitive radio networks
یک پروتکل موثر برای حفظ حریم خصوصی برای شبکه های رادیویی شناختی محور از پایگاه داده-2019
Cognitive radio is regarded as a promising technology for remedying spectrum shortage and improving spectrum utilization. However, database-driven cognitive radio networks (CRNs) are vulnerable to a series of security attacks and privacy threats, especially the privacy breach of secondary users (SUs). In this paper, we propose an efficient privacy-preserving protocol to protect the identity and trajectory privacy of each SU and to prevent the database (DB) from tracing any SU. Besides, this paper also aims at improving the efficiency of authentication and channel allocation to offer the best connectivity to SUs wherever they are and at any time. Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations (BSs), which enhances the security of CRNs communication. Based on channel pre-allocation to BSs, our protocol reduces the latency of obtaining available channels for SUs. Moreover, our protocol exploits reputation to motivate SUs to be honest and thus increases the utilization of the limited spectrum resources. The results of security analysis show that our protocol provides strong privacy preservation for SUs that the DB cannot get the entire trajectory of any SU, even the DB colludes with all BSs. Furthermore, the results also show that the proposed protocol can resist various types of attacks. The results of performance evaluation indicate the efficiency of the proposed privacy-preserving protocol.
Keywords: Cognitive radio networks | Privacy-preserving | Authentication | Elliptic curve cryptography | Reputation
مقاله انگلیسی
82 Efficient DCT-based secret key generation for the Internet of Things
تولید کلید مخفی کارا مبتنی بر DCT برای اینترنت اشیاء-2019
Cryptography is one of the most widely employed means to ensure confidentiality in the Internet of Things (IoT). Establishing cryptographically secure links between IoT devices requires the prior consensus to a secret encryption key. Yet, IoT devices are resource-constrained and cannot employ traditional key distribution schemes. As a result, there is a growing interest in generating secret random keys locally, using the shared randomness of the communicating channel. This article presents a secret key generation scheme, named SKYGlow, which is targeted at resource-constrained IoT platforms and tested on devices that employ IEEE 802.15.4 radios. We first examine the practical upper bounds of the number of secret bits that can be extracted from a message exchange. We contrast these upper bounds with the current state-of-the-art, and elaborate on the workings of the proposed scheme. SKYGlow applies the Discrete Cosine Transform (DCT) on channel observations of exchanged messages to reduce mismatches and in- crease correlation between the generated secret bits. We validate the performance of SKYGlow in both indoor and outdoor scenarios, at 2.4 GHz and 868 MHz respectively. The results suggest that SKYGlow can create secret 128-bit keys of 0.9978 bits entropy with just 65 packet exchanges, outperforming the state-of-the-art in terms of energy efficiency.
Keywords: Secret key generation | Physical layer security | IoT Security | Internet of Things (IoT) | IEEE 802.15.4
مقاله انگلیسی
83 SKA-PS: Secure key agreement protocol using physiological signals
SKA-PS: پروتکل توافق کلید امن با استفاده از سیگنال های فیزیولوژیکی-2019
In this paper, we propose SKA-PS, a novel Secure Key Agreement protocol using Physiological Signals, for Body Area Networks (BANs). Our protocol generates symmetric cryptographic keys using the physio- logical parameters derived from the physiological signals of the users, such as electrocardiogram, photo- plethysmogram and blood pressure. In our construction, we reduce the problem of secure key agreement into the problem of set reconciliation by representing the physiological parameter sequences generated from the physiological signals of the BAN users with appropriate sets. When properly selected param- eters are applied, biosensors of the same BAN user can agree on symmetric cryptographic keys with remarkably high true match and low false match rates (as much as 100% and 0.46% for pairwise execu- tion, and 100% and 0.26% for group execution, respectively), and low communication, computational and storage costs. We implemented our model in an embedded system, thus the results show real imple- mentation outcomes. Moreover, we comparatively analyze the performance of SKA-PS with two existing bio-cryptographic key agreement protocols and show that SKA-PS outperforms both in all performance metrics.
Keywords: Cryptographic key generation | Body area network security | Physiological signals | Key agreement | Bio-cryptography
مقاله انگلیسی
84 Enhanced authentication and key management scheme for securing data transmission in the internet of things
تصدیق پیشرفته و برنامه مدیریت کلیدی برای اطمینان از انتقال داده ها در اینترنت اشیا-2019
The Internet of Things (IoT), with its smartness and intelligence, is gradually changing human life by al- lowing everyday objects to be connected to the Internet. With the prevalence of the IoT, wireless sensor networks (WSNs) are attracting worldwide attention, because they cover a wide range of IoT applica- tions. The sensors collect data from the physical world and communicate with each other through wire- less links. Ensuring the security and privacy of WSNs’ communication is challenging. Recently, a secure authentication and key management scheme was proposed to secure data transmission in WSNs. In this paper, we show that this scheme has various security flaws, such as replay attack, denial of service attack, impersonation attack, and lack of mutual authentication and session key agreement. Then, we propose an enhanced scheme to overcome the identified security weaknesses. The security of the enhanced scheme is formally verified using the Burrows–Abadi–Needham logic and the Automated Validation of Internet Security Protocols and Applications tool. Our proposed scheme is more secure, efficient, and suitable for WSN-based IoT applications than recent related methods.
Keywords: Privacy | Mutual authentication | Key agreement | Elliptic curve cryptography | BAN logic | AVISPA
مقاله انگلیسی
85 An efficient queries processing model based on Multi Broadcast Searchable Keywords Encryption (MBSKE)
یک مدل پردازش نمایش داده های کارآمد بر اساس رمزگذاری کلیدواژه های قابل جستجو برای پخش چند پخشی (MBSKE)-2019
Cloud computing is a technology which has enabled many organizations to outsource their data in an encrypted form to improve processing times. The public Internet was not initially designed to handle massive quantities of data flowing through millions of networks. Thus, the rapid increase in broadcast users and growth in the amount of broadcasted information leads to a decrease in the speed of send- ing queries and receiving encrypted data from the cloud. In order to address this issue, Next Generation Internet (NGI) is being developed, capable of high speeds, while maintaining data privacy. This research proposes a novel search algorithm, entitled Multi-broadcast Searchable Keywords Encryption, which pro- cesses queries through a set of keywords. This set of keywords is sent from the users to the cloud server in an encrypted form, thus hiding all information about the user and the content of the queries from the cloud server. The proposed method uses a caching algorithm and provides an improvement of 40% in terms of runtime and trapdoor. In addition, the method minimizes computational costs, complexity, and maximizes throughput, in the cloud environment, whilst maintaining privacy and confidentiality of both the user and the cloud. The cloud returns encrypted query results to the user, where data is decrypted using the user’s private keys.
Keywords: Data encryption | Cryptography | Coding and information theory
مقاله انگلیسی
86 Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems
برون سپاری مبتنی بر پروکسی مبتنی بر هویت با ممیزی عمومی در سیستم های سایبر فیزیکی پزشکی مبتنی بر ابر-2019
Cloud-based medical cyber–physical system (MCPS) relies on cloud computing to provide powerful data storage and computing services. Based on the vital outsourced medical data, doctors can perform precise medical diagnosis for patients, thus the integrity verification of medical data has become increasingly important. In this paper, we propose an identity-based proxy-oriented outsourcing with public auditing scheme in cloudbased MCPS using elliptic curve cryptography. Our scheme enables a patient to authorize the proxy to generate and upload the signatures of medical data and corresponding encrypted medical data to cloud-based MCPS. Any third party auditor (TPA) can audit the medical data efficiently, without retrieving the entire medical data set. We provide the security proof of the proposed scheme, including the storage correctness guarantee and proxy-oriented privacy-preserving property. Moreover, our scheme is designed on identity-based systems, which can avoid complex certificates management. The efficiency comparison shows that our scheme is much more light-weight, and more suitable in cloud-based MCPS.
Keywords: Cloud computing | Identity-based proxy-oriented outsourcing | Medical cyber–physical system | Elliptic curve cryptography | Public auditing
مقاله انگلیسی
87 An efficient CPPA scheme for intelligent transportation networks
یک طرح کارآمد CPPA برای شبکه های حمل و نقل هوشمند-2019
To defend intelligent transportation networks’ security and privacy, existing standards employ the Public Key Infrastructure (PKI) authentication framework. However, the high associated PKI computation and communication overheads break ground for utilizing an alternative candidate, the Identity-based Cryptographic (IBC) authentication. Most of the underlined calculations of the IBC approaches rely on the elliptic curves’ pairing operation. Since the pairing function is a complex and computation intensive operation, several studies have developed pairingless IBC authentications and applied the hardware security of tamper-proof devices to secure the cryptographic parameters at user-end. Motivated by this trend, we compose a Pairingless Modified Efficient Conditional Privacy- Preserving Authentication Scheme (PME-CPPAS). Our scheme omits the utilization of the complex pairing operation as well as the demand for expensive tamper-proof devices. When analyzing the performance of the presented design, its effectiveness, in comparison to the available pairing-based and pairingless approaches, is proved in terms of computation complexity, communication overhead, and storage overhead. PME-CPPAS achieves less signing computational cost and comparable verification computational performance.
Keywords: Intelligent transportation/vehicular | networks | Authentication | Conditional privacy | Elliptic curve cryptography | Identity-based signature | Bilinear pairings | Tamper-proof device
مقاله انگلیسی
88 Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks
سیستم امنیتی پویا اینترنت اشیاء انرژی آگاه مبتنی بر رمزنگاری بیضوی منحنی و پروتکل حمل و نقل تله متری پیام برای کاهش حملات پخش-2019
Security in the context of Internet of Things (IoT) is a critical challenge. The purpose of this work is to model and evaluate a dynamic IoT security system based on a generic IoT edge network in which nodes exchange messages through the Message Queue Telemetry Transport (MQTT) protocol. This work aims to increase MQTT security by mitigating data tampering, eavesdropping and Replay attacks by using the Elliptic Curve Cryptography (ECC), timestamps and wake up patterns, with the purpose of preserving node energy. The evaluated results will show that it is possible to increase the system lifetime by linking security levels and energy.
Keywords: IoT | ECC | MQTT | Replay attacks | IDS
مقاله انگلیسی
89 Quantum Cryptography for Internet of Things Security
رمزنگاری کوانتومی برای امنیت اینترنت اشیاء-2019
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security.
Index Terms : Internet of things | quantum computing | quantum cryptography | security
مقاله انگلیسی
90 Error analysis and detection procedures for elliptic curve cryptography
روشهای تجزیه و تحلیل خطا و روشهای تشخیص رمزنگاری منحنی بیضوی-2019
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point. Fall of errors in encrypted/decrypted data delivery with the transmission can create the situation of erroneous data occurring. Without fault detection, in the context of encryption as well as decryption process can create the unprotected system due to random faults, and vulnerable to attack. We are striving to overcome these system weaknesses by introducing the application of nonlinear fault detection codes as it allows safeguarding the elliptic curve point while adding and doubling the operations from the fault attacks. The use of these codes ensures almost perfect error discovery capacity with a reasonably priced upfront cost. The ECC cryptosystem offered a failsafe fault detection scheme using an error detecting code with a proven rate of 99% fault detection coverage.
Keywords: Elliptic Curve Cryptography | Fault attack | Fault detection
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 810 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 810 :::::::: افراد آنلاین: 47