دانلود و نمایش مقالات مرتبط با Secure::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Secure

تعداد مقالات یافته شده: 514
ردیف عنوان نوع
1 Decentralization Using Quantum Blockchain: A Theoretical Analysis
تمرکززدایی با استفاده از بلاک چین کوانتومی: یک تحلیل نظری-2022
Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of distributed, secured, and peer-to-peer storage. One of its technical pillars is using public-key cryptography and hash functions, which promise a secure, pseudoanonymous, and distributed storage with nonrepudiation. This security is believed to be difficult to break with classical computational powers. However, recent advances in quantum computing have raised the possibility of breaking these algorithms with quantum computers, thus, threatening the blockchains’ security. Quantum-resistant blockchains are being proposed as alternatives to resolve this issue. Some propose to replace traditional cryptography with postquantum cryptography—others base their approaches on quantum computer networks or quantum internets. Nonetheless, a new security infrastructure (e.g., access control/authentication) must be established before any of these could happen. This article provides a theoretical analysis of the quantum blockchain technologies that could be used for decentralized identity authentication. We put together a conceptual design for a quantum blockchain identity framework and give a review of the technical evidence. We investigate its essential components and feasibility, effectiveness, and limitations. Even though it currently has various limitations and challenges, we believe a decentralized perspective of quantum applications is noteworthy and likely.
INDEX TERMS: Blockchains | consensus protocol | decentralized applications | identity management systems | quantum computing | quantum networks.
مقاله انگلیسی
2 Deployment-Ready Quantum Key Distribution Over a Classical Network Infrastructure in Padua
توزیع کلید کوانتومی آماده استقرار بر روی یک زیرساخت شبکه کلاسیک در پادوآ-2022
Current technological progress is driving Quantum Key Distribution towards a commercial and worldwide scale expansion. Its capability to deliver secure communication regardless of the computational power of the attackers will be a fundamental feature in the next generations of telecommunication networks. Nevertheless, demonstrations of QKD implementation in a real operating scenario and their coexistence with the classical telecom infrastructure are of fundamental importance for reliable exploitation. Here we present a Quantum Key Distribution application implemented over a classical fiber-based infrastructure. We exploit a 50 MHz source at 1550 nm, a single 13 km-long fiber cable for both the quantum and the classical channel, and a simplified receiver scheme with just one single-photon detector. In this way, we achieve an error rate of approximately 2% and a secret key rate of about 1.7 kbps, thus demonstrating the feasibility of low-cost and ready-to-use Quantum Key Distribution systems compatible with standard classical infrastructure.
Index Terms: Classical channel | cryptography | fiber, FPGA | padua | POGNAC | quantum communication | quantum key distribution | qubit4sync | telecommunication.
مقاله انگلیسی
3 iRestroom : A smart restroom cyberinfrastructure for elderly people
iRestroom: زیرساخت سایبری سرویس بهداشتی هوشمند برای افراد مسن-2022
According to a report by UN and WHO, by 2030 the number of senior people (age over 65) is projected to grow up to 1.4 billion, and which is nearly 16.5% of the global population. Seniors who live alone must have their health state closely monitored to avoid unexpected events (such as a fall). This study explains the underlying principles, methodology, and research that went into developing the concept, as well as the need for and scopes of a restroom cyberinfrastructure system, that we call as iRestroom to assess the frailty of elderly people for them to live a comfortable, independent, and secure life at home. The proposed restroom idea is based on the required situations, which are determined by user study, socio-cultural and technological trends, and user requirements. The iRestroom is designed as a multi-sensory place with interconnected devices where carriers of older persons can access interactive material and services throughout their everyday activities. The prototype is then tested at Texas A&M University-Kingsville. A Nave Bayes classifier is utilized to anticipate the locations of the sensors, which serves to provide a constantly updated reference for the data originating from numerous sensors and devices installed in different locations throughout the restroom. A small sample of pilot data was obtained, as well as pertinent web data. The Institutional Review Board (IRB) has approved all the methods.
keywords: اینترنت اشیا | حسگرها | نگهداری از سالمندان | سیستم های هوشمند | یادگیری ماشین | IoT | Sensors | Elder Care | Smart Systems | Machine Learning
مقاله انگلیسی
4 DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security. DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server. Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set. Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures. We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security
مقاله انگلیسی
5 Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
اجرای کارآمد توابع هش سبک در GPU و کامپیوترهای کوانتومی برای کاربردهای اینترنت اشیا-2022
Secure communication is important for Internet of Things (IoT) applications, to avoid cybersecurity attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions. Recently, US National Institute of Standards and Technology (NIST) announced a competition to standardize lightweight hash functions, which can be used in IoT applications. IoT communication involves various hardware platforms, from low-end microcontrollers to high-end cloud servers with GPU accelerators. Since many sensor nodes are connected to the gateway devices and cloud servers, performing high throughput integrity check is important to secure IoT applications. However, this is a time consuming task even for high-end servers, which may affect the response time in IoT systems. Moreover, no prior work had evaluated the performance of NIST candidates on contemporary processors like GPU and quantum computers. In this study, we showed that with carefully crafted implementation techniques, all the finalist hash function candidates in the NIST standardization competition can achieve high throughput (up-to 1,000 Gbps) on a RTX 3080 GPU. This research output can be used by IoT gateway devices and cloud servers to perform data integrity checks at high speed, thus ensuring a timely response. In addition, this is also the first study that showcase the implementation of NIST lightweight hash functions on a quantum computer (ProjectQ). Besides securing the communication in IoT, these efficient implementations on a GPU and quantum computer can be used to evaluate the strength of respective hash functions against brute-force attack.
INDEX TERMS: Graphics processing units (GPU) | hash function | lightweight cryptography | quantum computer.
مقاله انگلیسی
6 Hybrid CV-DV Quantum Communications and Quantum Networks
ارتباطات کوانتومی ترکیبی CV-DV و شبکه های کوانتومی-2022
Quantum information processing (QIP) opens new opportunities for high-performance computing, high-precision sensing, and secure communications. Among various QIP features, the entanglement is a unique one. To take full advantage of quantum resources, it will be necessary to interface quantum systems based on different encodings of information both discrete and continuous. The goal of this paper is to lay the groundwork for the development of a robust and efficient hybrid continuous variable-discrete variable (CV-DV) quantum network, enabling the distribution of a large number of entangled states over hybrid DV-CV multi-hop nodes in an arbitrary topology. The proposed hybrid quantum communication network (QCN) can serve as the backbone for a future quantum Internet, thus providing extensive longterm impacts on the economy and national security through QIP, distributed quantum computing, quantum networking, and distributed quantum sensing. By employing the photon addition and photon subtraction modules we describe how to generate the hybrid DV-CV entangled states and how to implement their teleportation and entanglement swapping through entangling measurements. We then describe how to extend the transmission distance between nodes in hybrid QCN by employing macroscopic light states, noiseless amplification, and reconfigurable quantum LDPC coding. We further describe how to enable quantum networking and distributed quantum computing by employing the deterministic cluster state concept introduced here. Finally, we describe how the proposed hybrid CV-DV states can be used in an entanglement-based hybrid QKD.
INDEX TERMS: Entanglement | photon addition | photon subtraction | hybrid CV-DV entangled states | teleportation | entanglement swapping | entanglement distribution | hybrid quantum communication networks | entanglement-based hybrid QKD.
مقاله انگلیسی
7 Polarization-Based Quantum Key Distribution Encoder and Decoder on Silicon Photonics
رمزگذار و رمزگشای توزیع کلید کوانتومی مبتنی بر پلاریزاسیون در فوتونیک سیلیکون-2022
Private and secure communication is an indispensable part of the government and individual activities. With the everevolving large-scale of quantum computing, traditional public-key cryptography is severely threatened since its security only relies on the computational complexity of certain mathematical functions. Quantum key distribution (QKD), ascribed to its security based on the inviolability of physics laws, provides an absolutely information-secure solution for the future extensive communication encrypting. Herein this Letter, we proposed a simplified and reconfigurable silicon photonics encoder using a pass-block architecture and experimentally demonstrated its performance with a specialized silicon photonics decoder for high-speed quantum key distribution in polarization-based decoy-state BB84 protocol. We achieved an estimated asymptotic secret key rate of 868 kbps with measured quantum bit error rate (QBER) of 0.90% (Z base) and 1.34% (X base) over 20 km emulated fiber link. This work further advances the process of applying QKD using silicon photonics devices into the future secure telecommunication network.
Index Terms: Quantum key distribution (QKD) | silicon photonics.
مقاله انگلیسی
8 Post-Quantum Era in V2X Security: Convergence of Orchestration and Parallel Computation
دوران پسا کوانتومی در امنیت V2X: همگرایی ارکستراسیون و محاسبات موازی-2022
Along with the potential emergence of quantum computing, safety and security of new and complex communication services such as automated driving need to be redefined in the post-quantum era. To ensure reliable, continuous, and secure operation of these scenarios, quantum-resistant security algorithms (QRSAs) that enable secure connectivity must be integrated into the network management and orchestration systems of mobile networks. This article explores a roadmap study of post-quantum era convergence with cellular connectivity using the Service & Computation Orchestrator (SCO) framework for enhanced data security in radio access and backhaul transmission with a particular focus on vehicle-to-everything services. Using NTRU as a QSRA, we show that the parallelization performance of the Toom-Cook and Karatsuba computation methods can vary based on different CPU load conditions through extensive simulations, and that the SCO framework can facilitate the selection of the most efficient computation for a given QRSA. Finally, we discuss the evaluation results, identify the current standardization efforts, and present possible directions for the coexistence of post-quantum and mobile network connectivity through an SCO framework that leverages parallel computing.
مقاله انگلیسی
9 Private Computation of Phylogenetic Trees Based on Quantum Technologies
محاسبات خصوصی درختان فیلوژنتیک بر اساس فناوری های کوانتومی-2022
Individuals’ privacy and legal regulations demand genomic data be handled and studied with highly secure privacy-preserving techniques. In this work, we propose a feasible Secure Multiparty Computation (SMC) system assisted with quantum cryptographic protocols that is designed to compute a phylogenetic tree from a set of private genome sequences. This system significantly improves the privacy and security of the computation thanks to three quantum cryptographic protocols that provide enhanced security against quantum computer attacks. This system adapts several distance-based methods (Unweighted Pair Group Method with Arithmetic mean, Neighbour-Joining, Fitch-Margoliash) into a private setting where the sequences owned by each party are not disclosed to the other members present in the protocol. We theoretically evaluate the performance and privacy guarantees of the system through a complexity analysis and security proof and give an extensive explanation about the implementation details and cryptographic protocols. We also implement a quantum-assisted secure phylogenetic tree computation based on the Libscapi implementation of the Yao, the PHYLIP library and simulated keys of two quantum systems: Quantum Oblivious Key Distribution and Quantum Key Distribution. This demonstrates its effectiveness and practicality. We benchmark this implementation against a classical-only solution and we conclude that both approaches render similar execution times, the only difference being the time overhead taken by the oblivious key management system of the quantum-assisted approach.
INDEX TERMS: Genomics | phylogenetic trees | privacy | quantum oblivious transfer | quantum secure multiparty computation | security.
مقاله انگلیسی
10 Quantum-Enabled 6G Wireless Networks: Opportunities and Challenges
شبکه‌های بی‌سیم 6G با قابلیت کوانتومی: فرصت‌ها و چالش‌ها-2022
With the increasing number of commercial 5G deployments, research on beyond 5G (B5G) and 6G has started in earnest. Although it is too early to clearly identify what 6G systems will look like or how they will be designed, it is certain that 6G systems will support novel use cases with challenging key performance indicators (KPIs), which will be empowered by new enabling technologies and network architectures. In parallel with the evolution of cellular systems from 5G toward 6G, quantum information technology (QIT) has been evolving rapidly in recent years in terms of quantum communications and quantum computing. It is envisioned that QIT will enable and boost future 6G systems from both communication and computing perspectives. For example, secure quantum communications such as quantum key distribution can be leveraged to improve 6G security. This article aims to provide a technology-driven and visionary description and exploration on how QIT can be leveraged for future 6G wireless networks.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 4717 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 4717 :::::::: افراد آنلاین: 79