دانلود و نمایش مقالات مرتبط با Identity::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Identity

تعداد مقالات یافته شده: 227
ردیف عنوان نوع
1 Decentralization Using Quantum Blockchain: A Theoretical Analysis
تمرکززدایی با استفاده از بلاک چین کوانتومی: یک تحلیل نظری-2022
Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of distributed, secured, and peer-to-peer storage. One of its technical pillars is using public-key cryptography and hash functions, which promise a secure, pseudoanonymous, and distributed storage with nonrepudiation. This security is believed to be difficult to break with classical computational powers. However, recent advances in quantum computing have raised the possibility of breaking these algorithms with quantum computers, thus, threatening the blockchains’ security. Quantum-resistant blockchains are being proposed as alternatives to resolve this issue. Some propose to replace traditional cryptography with postquantum cryptography—others base their approaches on quantum computer networks or quantum internets. Nonetheless, a new security infrastructure (e.g., access control/authentication) must be established before any of these could happen. This article provides a theoretical analysis of the quantum blockchain technologies that could be used for decentralized identity authentication. We put together a conceptual design for a quantum blockchain identity framework and give a review of the technical evidence. We investigate its essential components and feasibility, effectiveness, and limitations. Even though it currently has various limitations and challenges, we believe a decentralized perspective of quantum applications is noteworthy and likely.
INDEX TERMS: Blockchains | consensus protocol | decentralized applications | identity management systems | quantum computing | quantum networks.
مقاله انگلیسی
2 DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security. DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server. Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set. Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures. We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security
مقاله انگلیسی
3 Using social media photos and computer vision to assess cultural ecosystem services and landscape features in urban parks
استفاده از عکس های رسانه های اجتماعی و بینایی کامپیوتری برای ارزیابی خدمات اکوسیستم فرهنگی و ویژگی های چشم انداز در پارک های شهری-2022
Urban parks are important public places that provide an opportunity for city dwellers to interact with nature. In recent years, social media data have become a promising data source for the assessment of cultural ecosystem services (CES) and landscape features in urban parks. However, it is a challenging task to identify and classify the CES and landscape features from social media photos by manual content analysis. In addition, relatively few studies focused on the differences in landscape preferences between tourists and locals in urban parks. In this study, we used geotagged social media photos from Flickr and computer vision methods (scene recognition, image clustering and image labeling) based on the convolutional neural networks (CNN) and the Google Cloud Vision platform to assess the spatial preferences and landscape preferences (cultural ecosystem services and landscape features) of tourists and locals in the urban parks of Brussels. The spatial analysis results showed that the tourists’ photos were spatially concentrated on well-known parks located in the city center while the locals’ photos were rather spatially dispersed across all parks of the city. We identified 10 main landscape themes (corresponding to 4 CES categories and 10 landscape feature categories) from 20 image clusters by automated image analysis on social media photos. We also noticed that tourists paid more attention to the place identity featured by symbolic sculptures and buildings, while locals showed more interest in local species of plants, flowers, insects, birds, and animals. This research contributes to social media-based user preferences analysis and CES assessment, which could provide insights for urban park planning and tourism management.
keywords: داده های رسانه های اجتماعی | خدمات اکوسیستم فرهنگی | ویژگی های چشم انداز | پارک های شهری | بینایی کامپیوتر | Social media data | Cultural ecosystem services | Landscape features | Urban parks | Computer vision
مقاله انگلیسی
4 On the Capacity of Quantum Private Information Retrieval From MDS-Coded and Colluding Servers
در مورد ظرفیت بازیابی اطلاعات خصوصی کوانتومی از سرورهای کدگذاری شده و تبانی MDS-2022
In quantum private information retrieval (QPIR), a user retrieves a classical file from multiple servers by downloading quantum systems without revealing the identity of the file. The QPIR capacity is the maximal achievable ratio of the retrieved file size to the total download size. In this paper, the capacity of QPIR from MDS-coded and colluding servers is studied for the first time. Two general classes of QPIR, called stabilizer QPIR and dimension-squared QPIR induced from classical strongly linear PIR are defined, and the related QPIR capacities are derived. For the non-colluding case, the general QPIR capacity is derived when the number of files goes to infinity. A general statement on the converse bound for QPIR with coded and colluding servers is derived showing that the capacities of stabilizer QPIR and dimension-squared QPIR induced from any class of PIR are upper bounded by twice the classical capacity of the respective PIR class. The proposed capacity-achieving scheme combines the star-product scheme by Freij-Hollanti et al. and the stabilizer QPIR scheme by Song et al. by employing (weakly) self-dual Reed–Solomon codes.
Index Terms: Private information retrieval (PIR) | information theoretic privacy | quantum information theory | capacity.
مقاله انگلیسی
5 Trustworthy authorization method for security in Industrial Internet of Things
روش مجوز معتبر برای امنیت در اینترنت اشیا صنعتی-2021
Industrial Internet of Things (IIoT) realizes machine-to-machine communication and human–computer inter- action (HCI) through communication network, which makes industrial production automatic and intelligent. Security is critical in IIoT because of the interconnection of intelligent industrial equipment. In IIoT environment, legitimate human–computer interaction can only be performed by authorized professionals, and unauthorized access is not tolerated. In this paper, a reliable authentication method based on biological information is proposed. Specifically, the complete local binary pattern (CLPB) and the statistical local binary pattern (SLPB) are introduced to describe the local vein texture characteristics. Meanwhile, the contrast energy and frequency domain information are regarded as auxiliary information to interpret the finger vein. The distance between the features of the registration image and the test image is used to recognize the finger vein image, so as to realize identity authentication. The experiments are carried out on SDUMLA-FV database and FV-USM database, and results show that the presented method has achieved high recognition accuracy.
Keywords: Industrial Internet of Things (IIoT) | Human–computer interaction (HCI) | Biometric recognition | Comprehensive texture | Security system
مقاله انگلیسی
6 Efficient biometric-based identity management on the Blockchain for smart industrial applications
مدیریت هویت مبتنی بر بیومتریک کارآمد در Blockchain برای کاربردهای صنعتی هوشمند-2021
In this work, we propose a new Blockchain-based Identity Management system for smart industry. First, we describe an efficient biometric-based anonymous credential scheme, which supports selective disclosure, suspension/thaw and revocation of credentials/entities. Our system provides non-transferability through a freshly computed hidden biometric attribute, which is generated using a secure fuzzy extractor during each authentication. This mechanism combined with offchain storage guarantees GDPR compliance, which is required for protecting user’s data. We define blinded (Brands) DLRep scheme to provide multi-show unlinkability, which is a lacking feature in Brands’ credential based systems. For larger organizations, we re-design the system by replacing the Merkle Tree with an accumulator to improve scalability. The new system enables auditing by adapting the standard Industrial IoT (IIoT) Identity Management Lifecycle to Blockchain. Finally, we show that the new proposal outperforms BASS, i.e. the most recent blockchain-based anonymous credential scheme designed for smart industry. The computational cost at the user-side (can be a weak IoT device) of our scheme is 8-times less than that of BASS. Thus, our system is more suitable for IIoT.© 2020 Elsevier B.V. All rights reserved.
Keywords: Identity management | Smart industry | Blockchain | Non-transferability | Biometrics | DLRep | Multi-show unlinkability | Selective disclosure | Accumulators
مقاله انگلیسی
7 Social movements, identity and disruption in organizational fields: Accounting for farm animal welfare
جنبش های اجتماعی، هویت و اختلال در زمینه های سازمانی: حسابداری برای رفاه حیوانات مزرعه-2021
In this study we provide evidence on how accounting disclosures can motivate social movement organizations (SMOs) to create a new source of normativity in an organizational field, to impact upon firms through identity, image and culture. The source of normativity, the Business Benchmark on Farm Animal Welfare (BBFAW), was created as a means of accounting for farm animal welfare by food companies. Working at the intersection of theories relating to organizational fields, social movements and organizational identity, we investigate how the SMOs create the conditions for change through their framing of farm animal welfare, collective action and the mobilization of resources. Ideas such as institutional agency and institutional control are introduced to explain the power dynamics that enable change. By interpreting the organizational field as a relational space, identity, self-interest and intermittently-active fields provide further constructs to explain behaviour. Evidence from BBFAW reports and publications demonstrates how the NGOs employed a multi-period strategy to effect change. A longitudinal company case study provides an illustration of the cascade of the movement, demonstrating that there is more than an alignment of accounting disclosures. New business opportunities arise, requiring a realignment of strategy, a redesign of organizational architecture and participation of stakeholders. We illustrate our findings through the creation of a framework which could be employed more widely to study of sources of normativity in a relational field. This paper shows that accounting disclosures have a role to play in creating a new normativity that generates social change.
keywords: رفاه حیوانات | هویت | هنجار | فیلترهای سازمانی و جنبش های اجتماعی | Animal welfare | Identity | Normativity | Organizational fields and social movements
مقاله انگلیسی
8 Human identification driven by deep CNN and transfer learning based on multiview feature representations of ECG
Human identification driven by deep CNN and transfer learning based on multiview feature representations of ECG-2021
Increasingly smart techniques for counterfeiting face and fingerprint traits have increased the potential threats to information security systems, creating a substantial demand for improved security and better privacy and identity protection. The internet of Things (IoT)-driven fingertip electrocardiogram (ECG) acquisition provides broad application prospects for ECG-based identity systems. This study focused on three major impediments to fingertip ECG: the impact of variations in acquisition status, the high computational complexity of traditional convolutional neural network (CNN) models and the feasibility of model migration, and a lack of sufficient fingertip samples. Our main contribution is a novel fingertip ECG identification system that integrates transfer learning and a deep CNN. The proposed system does not require manual feature extraction or suffer from complex model calculations, which improves its speed, and it is effective even when only a small set of training data exists. Using 1200 ECG recordings from 600 individuals, we consider 5 simulated yet potentially practical scenarios. When analyzing the overall training accuracy of the model, its mean accuracy for the 540 chest- collected ECG from PhysioNet exceeded 97.60 %, and for 60 subjects from the CYBHi fingertip-collected ECG, its mean accuracy reached 98.77 %. When simulating a real-world human recognition system on 5 public datasets, the validation accuracy of the proposed model can nearly reach 100 % recognition, outperforming the original GoogLeNet network by a maximum of 3.33 %. To some degree, the developed architecture provides a reference for practical applications of fingertip-collected ECG-based biometric systems and for information network security.
Keywords: Off-the-person | Fingertip ECG biometric | Human identification | Convolutional neural network (CNN) | Transfer learning
مقاله انگلیسی
9 A cancelable biometric authentication system based on feature-adaptive random projection
یک سیستم احراز هویت بیومتریک قابل لغو بر اساس طرح تصادفی سازگار با ویژگی-2021
Biometric template data protection is critical in preventing user privacy and identity from leakage. Random projection based cancelable biometrics is an efficient and effective technique to achieve biometric template protection. However, traditional random projection based cancelable template design suffers from the attack via record multiplicity (ARM), where an adversary obtains multiple transformed templates from different applica- tions and the associated parameter keys so as to assemble them into a full-rank linear equation system, thereby retrieving the original feature vector. To address this issue, in this paper we propose a feature-adaptive random projection based method, in which the projection matrixes, the key to the ARM, are generated from one basic matrix in conjunction with local feature slots. The generated projection matrixes are discarded after use, thus making it difficult for the adversary to launch the ARM. Moreover, the random projection in the proposed method is performed on a local-feature basis. This feature-adaptive random projection can mitigate the negative impact of biometric uncertainty on recognition accuracy, as it limits the error to part of the transformed feature vector rather than the entire vector. The proposed method is evaluated on four public available databases FVC2002 DB1-DB3 and FVC2004 DB2. The experimental results and security analysis show the validity of the proposed method.
Keywords: Biometric authentication | Template protection | Random projection | Cancelable biometrics
مقاله انگلیسی
10 ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions
ECB2: یک طرح رمزگذاری جدید با استفاده از بیومتریک چهره برای امضای تراکنش های بلاک چین-2021
Blockchain is the technology on the basis of the recent smart and digital contracts. It ensures at this system the required characteristics to be effectively applied. In this work, we propose a novel encryption scheme specifically built to authorize and sign transactions in digital or smart contracts. The face is used as a biometric key, encoded through the Convolutional Neural Network (CNN), FaceNet. Then, this encoding is fused with an RSA key by using the Hybrid Information Fusion algorithm (BNIF). The results show a combined key that ensures the identity of the user that is executing the transaction by preserving privacy. Experiments reveal that, even in strong heterogeneous acquisition conditions for the biometric trait, the identity of the user is ensured and the contract is properly signed in less than 1.86 s. The proposed ECB2 encryption scheme is also very fast in the user template creation (0.05s) and requires at most four attempts to recognize the user with an accuracy of 94%.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 332 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 332 :::::::: افراد آنلاین: 48