Search Results/Filters    

Filters

Year

Banks



Expert Group









Full-Text


Author(s): 

JUELS A. | SUDAN M.

Issue Info: 
  • Year: 

    2002
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    193
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 193

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2010
  • Volume: 

    13
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    199
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 199

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Journal: 

Chem

Issue Info: 
  • Year: 

    2020
  • Volume: 

    6
  • Issue: 

    7
  • Pages: 

    1543-1559
Measures: 
  • Citations: 

    1
  • Views: 

    45
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 45

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

FAZELI SEYED AHMAD

Issue Info: 
  • Year: 

    2006
  • Volume: 

    8
  • Issue: 

    1 (29)
  • Pages: 

    163-185
Measures: 
  • Citations: 

    0
  • Views: 

    966
  • Downloads: 

    0
Abstract: 

Among the questions of fundamental importance in theoretical Sufism is analysis of the realm of all other than God, after oneness of being (wahdat al-wujood). Enumerating necessary preliminaries of the discussion, this paper investigates into tajalli (theophany) as a SCHEME, which is put in charge of explaining and analyzing Multiplicities. What, for the author, can be of special importance is the validity of what is ascribed to mystics, especially to those following Muhyi al-Din Ibn al-'Arabi. Meanwhile in the writings of some researchers, there are some wrong conceptions, which are decisively ascribed to Shaykh Akbar; if we are to prevent research harms, we should avoid such erroneous ascriptions and undertake to represent opinions precisely. So the author sets forth Shaykh Akbar's and his expositor's words in a narrator-like way and then analyze them.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 966

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    2
Measures: 
  • Views: 

    135
  • Downloads: 

    117
Abstract: 

IN THIS PAPER, WE REVIEW THE IDENTITY-BASED ENCRYPTION SCHEME (IBE) WHICH IS AN EMERGING AREA OF PUBLIC KEY CRYPTOGRAPHY. IN IBE SCHEME ENCRYPTION KEY CAN BE ANY STRING (SUCH EMAIL ADDRESS, PHONE NUMBER). FIRST OF ALL, WE GIVE THE BASIC CONSEPTS OF IBE SCHEMES AND SUBSECUENTLY EXPLAIN AN IBE SCHEME BASED ON BILINEAR MAPS BETWEEN GROUPS. FINALLY, WE DISCUSS ADVANTAGES AND DISADVANTAGES OF IBE SCHEMES.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 135

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 117
Issue Info: 
  • Year: 

    2019
  • Volume: 

    6
  • Issue: 

    1
  • Pages: 

    85-100
Measures: 
  • Citations: 

    0
  • Views: 

    274
  • Downloads: 

    87
Abstract: 

In this paper, we propose a new certi cateless identi cation SCHEME based on isogenies between elliptic curves that is a candidate for quantum-resistant problems. The proposed SCHEME has the batch veri cation property which allows verifying more than one identity by executing only a single challenge-response protocol.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 274

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 87 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    8
  • Issue: 

    18
  • Pages: 

    171-181
Measures: 
  • Citations: 

    0
  • Views: 

    517
  • Downloads: 

    0
Abstract: 

In this paper, the Lifshitz formula for the Casimir energy between two dielectrics in zero temperature is derived using box renormalization. Although there are several derivations for the force in this case in the literature, including Lifshitz’ s own proof, so far there has been no unambiguous and rigorous derivation for energy that we are aware of. Since energy becomes important in some cases, e. g. calculation of entropy or heat capacity, using the correct and precise definition of the Casimir energy, for the first time, we remove all of the infinities systematically without any ambiguity. This proof also shows the strength and accuracy of the box renormalization SCHEME.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 517

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    7
  • Issue: 

    2
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    317
  • Downloads: 

    111
Abstract: 

Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of colluders is shown to be an NP-complete problem. In this paper, we propose the Colluders Similarity Measure (CSM) which is used by a heuristic clustering algorithm (the Colluders Detection Algorithm (CDA)) to detect colluders in O (n2m + n4) in which m and n are the total number of nodes and colluders, respectively. Furthermore, we propose an architecture to implement the algorithm in a distributed manner which can be used together with compatible reputation management systems. Implementation results and comparison with other mitigation approaches show that our SCHEME prevents colluders from unfairly increasing their reputation and decreasing the reputation of the other nodes.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 317

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 111 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHAMAEI SHIVA | MOVAGHAR ALI

Issue Info: 
  • Year: 

    2014
  • Volume: 

    6
  • Issue: 

    2
  • Pages: 

    183-191
Measures: 
  • Citations: 

    0
  • Views: 

    455
  • Downloads: 

    124
Abstract: 

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole attack is a kind of such threats against routing processes which is particularly a challenging problem to detect and prevent in MANETs. In this paper, a two-phase detection SCHEME is proposed to detect and prevent wormhole attacks. First phase checks whether a wormhole tunnel exists on the selected path or not. If there is such a tunnel, the second phase is applied to confirm the existence of the wormhole attack, and locate a malicious node. The proposed detection SCHEME can appropriately detect all types of this kind of attacks such as in-band and out-of-band ones in different modes such as hidden or exposed, without any need of special hardware or time synchronization. In order to evaluate the performance of the proposed SCHEME, some various scenarios are simulated in the NS-2 simulator, and different measures are assessed. The results obtained from simulating the proposed SCHEME and other benchmarks indicate that in most criteria considered in this paper, the proposed SCHEME outperforms the proposed methods in prior works.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 455

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 124 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

DUBOIS F. | SAIDI A.

Journal: 

ESAIM: PROCEEDINGS

Issue Info: 
  • Year: 

    2000
  • Volume: 

    8
  • Issue: 

    -
  • Pages: 

    39-52
Measures: 
  • Citations: 

    1
  • Views: 

    175
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 175

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button