دانلود و نمایش مقالات مرتبط با رمزنگاری::صفحه 7
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - رمزنگاری

تعداد مقالات یافته شده: 253
ردیف عنوان نوع
61 Is biometrics the answer to crypto-currency crime?
آیا بیومتریک جواب جرم رمزنگاری ارزی است؟-2019
Crypto-currency – commonly defined as digital assets that use cryptography to secure transactions without the need for a central banking authority – is rising in popularity and being widely adopted across the globe. According to research by the University of Cambridge1, some 3 million people are estimated to be actively trading in crypto-currencies today, and many are already using crypto to pay for items such as hotels, games and even their rent.
مقاله انگلیسی
62 A ( k , n ) Threshold Partial Reversible AMBTC-based Visual Cryptography Using One Reference Image
A (k ، n) رمزنگاری تصویری مبتنی بر AMBTC قابل برگشت جزئی با استفاده از یک تصویر مرجع-2019
Recently, Yang et al. introduced a ðk; nÞ approach called Reversible Absolute moment block truncation coding Visual Cryptography Scheme (RAVCS) (Yang et al., 2017) to conceal a secret image into n AMBTC shares. However, a large number of reference images is used in their method. To reduce the number of reference images, a ðk; nÞ PRAVCS using one AMBTC reference image is introduced. In encoding phase, a binary secret image is shared into n AMBTC shadow images according to the base matrices generated by two proposed constructions. In decoding phase, the secret image is recovered by stacking sufficient bitmaps, and the AMBTC reference image is partially recovered as well. When n AMBTC shares are used, losslessly reconstruction for the reference image is obtained. Theoretical analysis and experiments by the proposed method are demonstrated to show the effectiveness. Moreover, Construction 1 has larger contrast, while Construction 2 achieves higher reversibility for more thresholds.
Keywords: Visual cryptography | Block truncation coding | Partial reversible | Meaningful share | Contrast | Reference image
مقاله انگلیسی
63 A combination of color-black-and-white visual cryptography and polynomial based secret image sharing
ترکیبی از رمزنگاری بصری رنگی سیاه و سفید و اشتراک گذاری مخفی مبتنی بر چند جمله ای-2019
A new ðk; nÞ threshold secret image sharing scheme with two decoding options is introduced in this paper. The proposed scheme combines color-black-and-white visual cryptography scheme (CBW-VCS) and polynomial based secret image sharing (PSIS) together, to offer stacking-to-see decryption and lossless image reconstruction. To construct the color shares, a general ðk; nÞ threshold CBW-VCS is firstly given. A grayscale secret image is converted to a p-radix image and a binary image. The p-radix image is encrypted by the ðk; nÞ PSIS under mod p operation, and n p-radix shadows are obtained. Then, a color share generation algorithm with data embedding is proposed to construct n color shares. Theoretical analysis and sufficient experiments are provided to show the effectiveness and advantages of the proposed scheme.
Keywords: Visual cryptography | Secret image sharing | Color | Embedding | Polynomial | Black and white
مقاله انگلیسی
64 A (2,2) XOR-based visual cryptography scheme without pixel expansion
(2،2) طرح رمزنگاری بصری مبتنی بر XOR بدون گسترش پیکسل-2019
Visual cryptography (VC) is a technique that encodes the content of a secret image into two or more images, which are called shares. These shares are printed on transparencies and superimposed to reveal the original secret image. Frequently, VC techniques require a pixel expansion and a good alignment, which reduces the final spatial resolution. In this paper, we propose a physical VC scheme that only requires two shares and do not demand a pixel expansion. The first share is a colored transparency printed on a Polyvinyl Chloride (PVC) surface of 3 mm, while the second share is a colored image displayed on a smartphone screen. The decoded pixels of the proposed scheme have defined colors and a good resolution. We perform a physical evaluation of the color interference properties of the two shares, to find the most adequate color space, and test the proposed method with practical examples.
Keywords: Visual cryptography | Visual secret sharing | Color interference
مقاله انگلیسی
65 A survey on privacy protection in blockchain system
مروری بر حفاظت از حریم خصوصی در سیستم بلاکچین-2019
Blockchain, as a decentralized and distributed public ledger technology in peer-to-peer network, has received considerable attention recently. It applies a linked block structure to verify and store data, and applies the trusted consensus mechanism to synchronize changes in data, which makes it possible to create a tamper-proof digital platform for storing and sharing data. It is believed that blockchain can be utilized in diverse Internet interactive systems (e.g., Internet of Things, supply chain systems, identity management, and so on). However, there are some privacy challenges that may hinder the applications of blockchain. The goal of this survey is to provide some insights into the privacy issues associated with blockchain. We analyze the privacy threats in blockchain and discuss existing cryptographic defense mechanisms, i.e., anonymity and transaction privacy preservation. Furthermore, we summarize some typical implementations of privacy preservation mechanisms in blockchain and explore future research challenges that still need to be addressed in order to preserve privacy when blockchain is used.
Keywords: Privacy | Anonymity | Blockchain | Cryptography | Cryptocurrency
مقاله انگلیسی
66 Cryptographic primitives in blockchains
رمزنگاری پیشین در بلاک چین ها-2019
Blockchain, as one of the crypto-intensive creatures, has become a very hot topic recently. Although many surveys have recently been dedicated to the security and privacy issues of blockchains, there still lacks a systematic examination on the cryptographic primitives in blockchains. To this end, we in this paper conduct a systematic study on the cryptographic primitives in blockchains by comprehensive analysis on top-30 mainstream cryptocurrencies, in terms of the usages, functionalities, and evolutions of these primitives. We hope that it would be helpful for cryptographers who are going to devote themselves to the blockchain research, and the financial engineers/managers who want to evaluate cryptographic solutions for blockchain-based projects.
Keywords: Blockchain | Hash function | Accumulator | Commitment | Zero-knowledge proofs
مقاله انگلیسی
67 Cryptocurrency reaction to FOMC Announcements: Evidence ofheterogeneity based on blockchain stack position
واکنش رمزنگاری به اطلاعیه های FOMC: شواهد ناهمگونی بر اساس موقعیت پشته بلاکچین -2019
We examine the response of a broad set of digital assets to US Federal Fund interest rate and quantitativeeasing announcements, specifically examining associated volatility spillover and feedback effects. Weclassify each digital asset into one of three categories: Currencies; Protocols; and Decentralised Applica-tions (dApps). Currency-based digital assets experience idiosyncratic spillovers in the period immediatelyafter US monetary policy announcements, while application or protocol-based digital assets are largelyimmune to policy volatility spillover and feedback. Mineable digital assets are found to be more sus-ceptible to monetary policy volatility spillovers and feedback than non-mineable. Responses indicate adiverse market within which, not all assets are Keywords:Cryptocurrencies | Digital assets| GARCH | Volatility spillovers | Monetary policy
مقاله انگلیسی
68 Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography
پروتکل احراز هویت کاربر از راه دور سبک وزن برای شبکه های 5G چند سرور با استفاده از رمزنگاری کلید عمومی عمومی خود گواهی شده-2019
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication protocol needs to be developed for complex 5G networks. In this paper, we propose a lightweight and untraceable authentication protocol for multi-server-based 5G networks. To reduce computational complexity, we employ selfcertified public key cryptography based on elliptic curve cryptography to authenticate the validation of users and servers. Without pairing operations, our scheme could improve performance efficiency. Also, a formal security model is designed to prove that our protocol is secure against forgery attack due to the discrete logarithm and the computational Diffie-Hellman problem. Performance analysis further shows that our protocol has a lower communication and computational overhead. Also, our protocol could support anonymous mutual authentication.
Keywords: Multi-server | Mutual authentication | Lightweight
مقاله انگلیسی
69 Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas
یکپارچگی داده های از راه دور کارآمد ، پویا و مبتنی بر هویت بررسی تکرارهای متعدد-2019
Nowadays, cloud storage plays an increasingly important role in our daily life. However, the cloud users do not have the physical possession of their own data anymore. To confirm whether the outsourced files are maintained intact without downloading them entirely, a mechanism namely Remote Data Integrity Checking (RDIC) is invented. Currently, some RDIC schemes allow the data owners with limited computation or communication power to delegate the checking task to a third-party verifier. However, most of these schemes rely on the complicated and resource consuming public key infrastructure (PKI). In this paper, we propose a novel identitybased RDIC scheme, namely Efficient, Dynamic and Identity-based Multiple Replication Provable Data Possession (EDID-MRPDP) without the burden of PKI. We introduce a new construction of Homomorphic Verifiable Tag (HVT) and a novel data structure namely Compressed Authentication Array (CAA), which allow EDID-MRPDP to perform batch verification for multiple data owners and cloud servers simultaneously and efficiently, both from computation and communication aspects. To the best of our knowledge, EDID-MRPDP is the first ID-based RDIC scheme with full dynamic updates and multi-replica batch checking. We provide comprehensive correctness and soundness proofs of EDID-MRPDP. Meanwhile, the detailed performance analyses and simulations show that EDID-MRPDP is practical for large-scale cloud applications.
Keywords: Cloud storage | Dynamic data update | Identity-based cryptography | Multi-replica | Batch checking | Provable data possession
مقاله انگلیسی
70 Privacy-preserving aggregation for cooperative spectrum sensing
تجمیع حفظ حریم خصوصی برای سنجش طیف تعاونی-2019
Cognitive radio technology has been proposed as a promising way to alleviate spectrum scarcity. In cognitive radio networks, cooperative spectrum sensing is an effective approach to improve spectrum-estimation accuracy. In this approach, a fusion center (FC) outsources sensing tasks to secondary users (SUs), and aggregates sensing reports provided by SUs to estimate spectrum availability. However, as sensing reports are highly correlated to SUs’ real locations, revealing sensing reports to an untrusted FC may incur a serious privacy threat for SUs. In this paper, we propose an efficient scheme that allows the FC to learn desired statistics from a group of SUs without compromising individual privacy. Moreover, the FC is still able to compute the sum over the remaining SUs when some SUs fail to submit their reports. Besides, to ensure secure communication in cooperative spectrum sensing, the proposed scheme verifies the legitimacy of SUs by utilizing the elliptic curve cryptography technique. The results of security analysis show that the proposed scheme achieves the combined objectives of privacy preservation, authentication, fault tolerance, and resistance to various types of attacks. Performance evaluation results demonstrate the feasibility and practicality of the proposed scheme.
Keywords: Cognitive radio networks | Cooperative spectrum sensing | Privacy preservation | Authentication | Fault tolerance | Elliptic curve cryptography
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 6366 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 40633 :::::::: افراد آنلاین: 52