فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها




گروه تخصصی











متن کامل


اطلاعات دوره: 
  • سال: 

    1388
  • دوره: 

    6
تعامل: 
  • بازدید: 

    379
  • دانلود: 

    165
چکیده: 

از آنجا که مکالمات در سیستم GSM توسط تجهیزات مدرن قابل ردگیری و شنود است و با توجه به اهمیت مکالمات صورت گرفته توسط مقامات نظامی یا دولتی، ضرورت ساخت تجهیزات سخت افزاری یا نرم افزاری جهت رمز کردن مکالمات موبایل آنهم بصورت بلادرنگ به وضوح دیده می شود با توجه به پیشرفت سریع تکنولوژی و ساخت گوشیهای تجاری جدیدی که دارای پردازنده های تا 400 مگاهرتز و گاهی اوقات بیشتر هستند، تلاش شده است که یک محصول نرم افزار مبتنی بر ویندوز موبایل (Windows CE 4.x) طراحی گردد تا بدینوسیله امکان مکالمات بلادرنگ موبایل و همچنین دیگر امکانات مخابراتی نظیر ارسال پیام کوتاه رمز شده و غیره را فراهم آورد.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 379

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 165
نویسندگان: 

Ravansalar Nasrin | Pourahmadi Vahid

اطلاعات دوره: 
  • سال: 

    2020
  • دوره: 

    52
  • شماره: 

    1
  • صفحات: 

    97-106
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    86
  • دانلود: 

    0
چکیده: 

Typical cryptography schemes are not well suited for low complexity types of equipment, e. g. Internet of things (IoT) devices, as they may need high power or impose high computational complexity. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consider a network with multiple groups of users as receivers and a transmitter that intends to send different messages to each group. There are also some eavesdroppers (Eavs) at known locations of the environment. The goal of this paper is to find the beamforming vectors that minimize the total transmitting power while keeping the signal level above a threshold at the exact locations of the legitimate receivers (both angle and range) and keeping it less than another threshold at eavesdropping points. We use frequency diverse arrays (FDA) at the transmitter; thus, the transmitter also needs to determine the frequency that each antenna element must use for data transmission. This condition makes the problem non-convex and so we propose an approximate solution for solving this optimization problem. Simulation results show the performance of the scheme in a particular network setting.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 86

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2012
  • دوره: 

    43
تعامل: 
  • بازدید: 

    152
  • دانلود: 

    0
چکیده: 

MOST Secure Communication SCHEMES USING CHAOTIC DYNAMICS ARE BASED ON IDENTICAL SYNCHRONIZATION. IN THIS PAPER, WE PRESENT PROJECTIVE SYNCHRONIZATION BETWEEN TWO CHAOTIC SYSTEMS VIA ADAPTIVE LINEAR FEEDBACK CONTROL. THEN, WE SHOW THE POSSIBILITY OF Secure Communication USING ADAPTIVE PROJECTIVE SYNCHRONIZATION. FINALLY, NUMERICAL SIMULATIONS SHOW THAT THE OBTAINED THEORETIC RESULTS ARE FEASIBLE AND EFFICIENT.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 152

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    2018
  • دوره: 

    1
تعامل: 
  • بازدید: 

    173
  • دانلود: 

    0
چکیده: 

SCADA NETWORKS HAVE IMPORTANT ROLE IN MODERN INDUSTRIES AND INFRASTRUCTURES. THUS, Secure SCADA Communication IS IMPORTANT FOR INDUSTRIES AND INFRASTRUCTURES.KEY MANAGEMENT SCHEME IS ESSENTIAL FOR Secure SCADA Communication. THIS PAPER PRESENTS AND EVALUATES NEW AND HIGH-PERFORMANCE KEY MANAGEMENT SCHEME BY USING CCS SCALAR MULTIPLICATION AND COMPACT SD MODULAR MULTIPLICATION FOR ENCRYPTION AND DECRYPTION. THE RESULTS DEMONSTRATE THAT THE PROPOSED CCS COMPACT SD KEY MANAGEMENT SCHEME PROVIDES AN IMPROVEMENT IN TERMS OF THE NUMBER OF REQUIRED MULTIPLICATION STEPS COMPARED TO OTHER KEY MANAGEMENT SCHEMES.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 173

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
اطلاعات دوره: 
  • سال: 

    1398
  • دوره: 

    49
  • شماره: 

    1 (پیاپی 87)
  • صفحات: 

    89-100
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    429
  • دانلود: 

    139
چکیده: 

در این مقاله امنیت لایه فیزیکی یک سیستم بی سیم مشارکتی امن کاملاً دوطرفه (FD) چند آنتنه بررسی می شود. فرض می شود که گره مبدأ با گره مقصد به کمک یک گره رله درحضور یک گره استراق سمع کننده ارتباط برقرار می کند. با در نظرگرفتن حالت عملیاتی کاملاً دوطرفه برای گره مقصد، هم زمان با دریافت اطلاعات ارسالی در آن، یک سیگنال تداخل جهت تضعیف لینک گره رله-گره استراق سمع کننده از گره مقصد به طرف گره استراق سمع کننده ارسال می شود. طرح های پرتودهی مختلفی برای سیستم مورد نظر پیشنهاد داده می شود و برای آن ها نرخ های محرمانه لحظه ای و متوسط محاسبه می شود. همچنین تأثیر تعداد آنتن ها، موقعیت گره استراق سمع کننده و نیز تأثیر توان ارسالی گره مبدأ و مقصد بر روی نرخ محرمانه متوسط را مورد مطالعه قرار می گیرد. نشان داده می شود که روش های پرتودهی پیشنهادی، به همراه ارسال سیگنال تداخل از گره مقصد به میزان زیادی امنیت شبکه مشارکتی را بهبود می دهند. همچنین نتایج شبیه سازی نشان می دهد که انتخاب نوع پرتودهی نقش کلیدی در میزان بهره سیستم کاملاً دوطرفه پیشنهادی دارد.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 429

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 139 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

اطلاعات دوره: 
  • سال: 

    2021
  • دوره: 

    173
  • شماره: 

    -
  • صفحات: 

    102817-102817
تعامل: 
  • استنادات: 

    1
  • بازدید: 

    30
  • دانلود: 

    0
کلیدواژه: 
چکیده: 

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 30

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
نویسندگان: 

MURALI K. | LAKSHMANAN M.

اطلاعات دوره: 
  • سال: 

    2003
  • دوره: 

    11
  • شماره: 

    -
  • صفحات: 

    1309-1315
تعامل: 
  • استنادات: 

    1
  • بازدید: 

    124
  • دانلود: 

    0
کلیدواژه: 
چکیده: 

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 124

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2020
  • دوره: 

    12
  • شماره: 

    2
  • صفحات: 

    101-111
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    152
  • دانلود: 

    0
چکیده: 

Machine to machine (M2M) Communication, which is also known as machine type Communication (MTC), is one of the fascinating parts of mobile Communication technology and also an important practical application of the Internet of Things. The main objective of this type of Communication is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, various protocols and schemes were proposed to achieve security requirements in M2M Communication and reduce computational and Communication costs. In this paper, we propose the group-based Secure, lightweight handover authentication (GSLHA) protocol for M2M Communication in LTE and future 5G networks. The proposed protocol mutually authenticates a group of MTC devices (MTCDs) and a new eNodeB (eNB) when these simultaneously enter the coverage of the eNB with considering all the cellular network requirements. The security analysis and formal verification by using the AVISPA tool show that the proposed protocol has been able to achieve all the security goals and overcome various attacks. In addition, the comparative performance analysis of the handover authentication protocols shows that the proposed GSLHA protocol has the best computational and Communication overheads.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 152

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Rahmati Vahid | Mazidi Sharafabadi Ali Mohammad | Afshani Seyed Alireza

اطلاعات دوره: 
  • سال: 

    2022
  • دوره: 

    3
  • شماره: 

    22
  • صفحات: 

    50-57
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    21
  • دانلود: 

    0
چکیده: 

This study seeks to empirically explain the effect of public relations strategies in the Ports and Maritime Organization on Secure Communications. Accordingly, and considering the importance of Iran as a country with 11 ports and a wide range of commercial, military and passenger shipping, it should take appropriate measures for shipping safety; From this point of view, all elements of the organization (internal and external stakeholders) need to be involved in decision-making in a tangible and intangible way. The research method in this research is mixed. In the qualitative part, interview tools were used and experts were interviewed until the theoretical saturation was achieved. Coding was done using MAXQDA software and the dimensions of seafarers' problems, shareholder responsibility, maritime accident management, maritime crisis management, protection of interests Demand for seafaring, maritime culture, reducing seafarers 'concerns, seafaring culture and improving the quality of seafarers' education were identified, which were evaluated by public relations strategies. In a small part, the research hypotheses were evaluated using a questionnaire tool. SPSS and Linear Regression Method Hypotheses were analyzed and all research hypotheses were confirmed.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 21

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    621
  • دوره: 

    16
  • شماره: 

    1
  • صفحات: 

    179-190
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    8
  • دانلود: 

    0
چکیده: 

In this paper, we propose using Frobenius rings to increase the security of data Communication in medical health systems based on the Internet of Things. Frobenius rings are algebraic structures widely studied in mathematics and have found applications in cryptography and coding theory. We show how Frobenius rings can be used to create efficient encryption and decryption algorithms that can Secure Communications in IoT-based medical health systems. IoT refers to internet Communication between objects and equipment that are in our environment. These devices or objects connected to the Internet can be controlled and managed remotely using software on smartphones, tablets, computers, gadgets, smart watches, televisions, and any other object. Here, an attempt is made to create a safe bridge between the patient with simple medical measuring devices. The doctor who does not have direct access to him and can only receive the medical values measured by the patient through the Internet and give his definitive opinion about them, for example, the devices for measuring the patient's medical quantities can be simple mobile phone apps, and the doctor can be an artificial intelligence for medical measurements or a real doctor. We also present a case study with an example of medical factors such as heart rate, blood pressure, weight, blood sugar, and respiratory rate, which demonstrates the effectiveness of our proposed approach. Our results show that the use of Frobenius rings can significantly improve data Communication security in IoT-based medical health systems without compromising system performance. In conclusion, our proposed approach provides a suitable solution for securing data Communication in IoT-based medical health systems. The use of Frobenius rings can increase the confidentiality, integrity and availability of sensitive health information, thereby ensuring that patient's privacy is protected while enabling efficient management of their health data.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 8

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button