با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
61 |
Is biometrics the answer to crypto-currency crime?
آیا بیومتریک جواب جرم رمزنگاری ارزی است؟-2019 Crypto-currency – commonly defined as digital assets that use cryptography to secure transactions without the need for a central banking authority – is rising in popularity and being widely adopted across the globe. According to research by the University of Cambridge1, some 3 million people are estimated to be actively trading in crypto-currencies today, and many are already using crypto to pay for items such as hotels, games and even their rent. |
مقاله انگلیسی |
62 |
A ( k , n ) Threshold Partial Reversible AMBTC-based Visual Cryptography Using One Reference Image
A (k ، n) رمزنگاری تصویری مبتنی بر AMBTC قابل برگشت جزئی با استفاده از یک تصویر مرجع-2019 Recently, Yang et al. introduced a ðk; nÞ approach called Reversible Absolute moment block truncation
coding Visual Cryptography Scheme (RAVCS) (Yang et al., 2017) to conceal a secret image into n
AMBTC shares. However, a large number of reference images is used in their method. To reduce the number
of reference images, a ðk; nÞ PRAVCS using one AMBTC reference image is introduced. In encoding
phase, a binary secret image is shared into n AMBTC shadow images according to the base matrices generated
by two proposed constructions. In decoding phase, the secret image is recovered by stacking sufficient
bitmaps, and the AMBTC reference image is partially recovered as well. When n AMBTC shares are
used, losslessly reconstruction for the reference image is obtained. Theoretical analysis and experiments
by the proposed method are demonstrated to show the effectiveness. Moreover, Construction 1 has larger
contrast, while Construction 2 achieves higher reversibility for more thresholds. Keywords: Visual cryptography | Block truncation coding | Partial reversible | Meaningful share | Contrast | Reference image |
مقاله انگلیسی |
63 |
A combination of color-black-and-white visual cryptography and polynomial based secret image sharing
ترکیبی از رمزنگاری بصری رنگی سیاه و سفید و اشتراک گذاری مخفی مبتنی بر چند جمله ای-2019 A new ðk; nÞ threshold secret image sharing scheme with two decoding options is introduced in this paper.
The proposed scheme combines color-black-and-white visual cryptography scheme (CBW-VCS) and polynomial
based secret image sharing (PSIS) together, to offer stacking-to-see decryption and lossless image
reconstruction. To construct the color shares, a general ðk; nÞ threshold CBW-VCS is firstly given. A grayscale
secret image is converted to a p-radix image and a binary image. The p-radix image is encrypted by the
ðk; nÞ PSIS under mod p operation, and n p-radix shadows are obtained. Then, a color share generation algorithm
with data embedding is proposed to construct n color shares. Theoretical analysis and sufficient
experiments are provided to show the effectiveness and advantages of the proposed scheme. Keywords: Visual cryptography | Secret image sharing | Color | Embedding | Polynomial | Black and white |
مقاله انگلیسی |
64 |
A (2,2) XOR-based visual cryptography scheme without pixel expansion
(2،2) طرح رمزنگاری بصری مبتنی بر XOR بدون گسترش پیکسل-2019 Visual cryptography (VC) is a technique that encodes the content of a secret image into two or more
images, which are called shares. These shares are printed on transparencies and superimposed to reveal
the original secret image. Frequently, VC techniques require a pixel expansion and a good alignment,
which reduces the final spatial resolution. In this paper, we propose a physical VC scheme that only
requires two shares and do not demand a pixel expansion. The first share is a colored transparency
printed on a Polyvinyl Chloride (PVC) surface of 3 mm, while the second share is a colored image displayed
on a smartphone screen. The decoded pixels of the proposed scheme have defined colors and a
good resolution. We perform a physical evaluation of the color interference properties of the two shares,
to find the most adequate color space, and test the proposed method with practical examples. Keywords: Visual cryptography | Visual secret sharing | Color interference |
مقاله انگلیسی |
65 |
A survey on privacy protection in blockchain system
مروری بر حفاظت از حریم خصوصی در سیستم بلاکچین-2019 Blockchain, as a decentralized and distributed public ledger technology in peer-to-peer network, has received
considerable attention recently. It applies a linked block structure to verify and store data, and applies the
trusted consensus mechanism to synchronize changes in data, which makes it possible to create a tamper-proof
digital platform for storing and sharing data. It is believed that blockchain can be utilized in diverse Internet
interactive systems (e.g., Internet of Things, supply chain systems, identity management, and so on). However,
there are some privacy challenges that may hinder the applications of blockchain. The goal of this survey is
to provide some insights into the privacy issues associated with blockchain. We analyze the privacy threats
in blockchain and discuss existing cryptographic defense mechanisms, i.e., anonymity and transaction privacy
preservation. Furthermore, we summarize some typical implementations of privacy preservation mechanisms in
blockchain and explore future research challenges that still need to be addressed in order to preserve privacy
when blockchain is used. Keywords: Privacy | Anonymity | Blockchain | Cryptography | Cryptocurrency |
مقاله انگلیسی |
66 |
Cryptographic primitives in blockchains
رمزنگاری پیشین در بلاک چین ها-2019 Blockchain, as one of the crypto-intensive creatures, has become a very hot topic recently. Although many surveys
have recently been dedicated to the security and privacy issues of blockchains, there still lacks a systematic
examination on the cryptographic primitives in blockchains. To this end, we in this paper conduct a systematic
study on the cryptographic primitives in blockchains by comprehensive analysis on top-30 mainstream cryptocurrencies,
in terms of the usages, functionalities, and evolutions of these primitives. We hope that it would
be helpful for cryptographers who are going to devote themselves to the blockchain research, and the financial
engineers/managers who want to evaluate cryptographic solutions for blockchain-based projects. Keywords: Blockchain | Hash function | Accumulator | Commitment | Zero-knowledge proofs |
مقاله انگلیسی |
67 |
Cryptocurrency reaction to FOMC Announcements: Evidence ofheterogeneity based on blockchain stack position
واکنش رمزنگاری به اطلاعیه های FOMC: شواهد ناهمگونی بر اساس موقعیت پشته بلاکچین -2019 We examine the response of a broad set of digital assets to US Federal Fund interest rate and quantitativeeasing announcements, specifically examining associated volatility spillover and feedback effects. Weclassify each digital asset into one of three categories: Currencies; Protocols; and Decentralised Applica-tions (dApps). Currency-based digital assets experience idiosyncratic spillovers in the period immediatelyafter US monetary policy announcements, while application or protocol-based digital assets are largelyimmune to policy volatility spillover and feedback. Mineable digital assets are found to be more sus-ceptible to monetary policy volatility spillovers and feedback than non-mineable. Responses indicate adiverse market within which, not all assets are Keywords:Cryptocurrencies | Digital assets| GARCH | Volatility spillovers | Monetary policy |
مقاله انگلیسی |
68 |
Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography
پروتکل احراز هویت کاربر از راه دور سبک وزن برای شبکه های 5G چند سرور با استفاده از رمزنگاری کلید عمومی عمومی خود گواهی شده-2019 Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication
protocol needs to be developed for complex 5G networks. In this paper, we propose a lightweight and untraceable
authentication protocol for multi-server-based 5G networks. To reduce computational complexity, we employ selfcertified
public key cryptography based on elliptic curve cryptography to authenticate the validation of users and
servers. Without pairing operations, our scheme could improve performance efficiency. Also, a formal security
model is designed to prove that our protocol is secure against forgery attack due to the discrete logarithm and the
computational Diffie-Hellman problem. Performance analysis further shows that our protocol has a lower
communication and computational overhead. Also, our protocol could support anonymous mutual authentication. Keywords: Multi-server | Mutual authentication | Lightweight |
مقاله انگلیسی |
69 |
Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas
یکپارچگی داده های از راه دور کارآمد ، پویا و مبتنی بر هویت بررسی تکرارهای متعدد-2019 Nowadays, cloud storage plays an increasingly important role in our daily life. However, the cloud users do not
have the physical possession of their own data anymore. To confirm whether the outsourced files are maintained
intact without downloading them entirely, a mechanism namely Remote Data Integrity Checking (RDIC) is
invented. Currently, some RDIC schemes allow the data owners with limited computation or communication
power to delegate the checking task to a third-party verifier. However, most of these schemes rely on the
complicated and resource consuming public key infrastructure (PKI). In this paper, we propose a novel identitybased
RDIC scheme, namely Efficient, Dynamic and Identity-based Multiple Replication Provable Data Possession
(EDID-MRPDP) without the burden of PKI. We introduce a new construction of Homomorphic Verifiable Tag
(HVT) and a novel data structure namely Compressed Authentication Array (CAA), which allow EDID-MRPDP to
perform batch verification for multiple data owners and cloud servers simultaneously and efficiently, both from
computation and communication aspects. To the best of our knowledge, EDID-MRPDP is the first ID-based RDIC
scheme with full dynamic updates and multi-replica batch checking. We provide comprehensive correctness and
soundness proofs of EDID-MRPDP. Meanwhile, the detailed performance analyses and simulations show that
EDID-MRPDP is practical for large-scale cloud applications. Keywords: Cloud storage | Dynamic data update | Identity-based cryptography | Multi-replica | Batch checking | Provable data possession |
مقاله انگلیسی |
70 |
Privacy-preserving aggregation for cooperative spectrum sensing
تجمیع حفظ حریم خصوصی برای سنجش طیف تعاونی-2019 Cognitive radio technology has been proposed as a promising way to alleviate spectrum scarcity. In cognitive
radio networks, cooperative spectrum sensing is an effective approach to improve spectrum-estimation accuracy.
In this approach, a fusion center (FC) outsources sensing tasks to secondary users (SUs), and aggregates sensing
reports provided by SUs to estimate spectrum availability. However, as sensing reports are highly correlated to
SUs’ real locations, revealing sensing reports to an untrusted FC may incur a serious privacy threat for SUs. In this
paper, we propose an efficient scheme that allows the FC to learn desired statistics from a group of SUs without
compromising individual privacy. Moreover, the FC is still able to compute the sum over the remaining SUs
when some SUs fail to submit their reports. Besides, to ensure secure communication in cooperative spectrum
sensing, the proposed scheme verifies the legitimacy of SUs by utilizing the elliptic curve cryptography technique.
The results of security analysis show that the proposed scheme achieves the combined objectives of privacy
preservation, authentication, fault tolerance, and resistance to various types of attacks. Performance evaluation
results demonstrate the feasibility and practicality of the proposed scheme. Keywords: Cognitive radio networks | Cooperative spectrum sensing | Privacy preservation | Authentication | Fault tolerance | Elliptic curve cryptography |
مقاله انگلیسی |