Sharif University of Technology

Displaying 1-29 of 29 results

  • White Papers // Mar 2012

    An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps

    In a Multistage Secret Sharing (MSSS) Scheme, the authorized subsets of participants could reconstruct a number of secrets in consecutive stages. A One-Stage Multisecret Sharing (OSMSS) Scheme is a special case of MSSS schemes that all secrets are recovered simultaneously. In these schemes, in addition to the individual shares, the...

    Provided By Sharif University of Technology

  • White Papers // Mar 2012

    A Survey for Load Balancing in Mobile WiMAX Networks

    Mobile Worldwide Interoperability for Microwave Access (Mobile WiMAX) is a wireless access technology based on IEEE 802.16e standard. Mobile WiMAX supports mobility, high utilization of radio resources, beneficial Quality of Service (QoS) framework, and flexible centralized scheduling, which are offered by connection oriented MAC layer. Due to the architecture of...

    Provided By Sharif University of Technology

  • White Papers // Feb 2012

    A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles

    In this paper, a novel strong designated verifier signature scheme based on bilinear pairings with provable security in the standard model is proposed, while the existing ones are secure in the random oracle model. In 2007 and 2011, two strong designated verifier signature schemes in the standard model are proposed...

    Provided By Sharif University of Technology

  • White Papers // Nov 2011

    Two RFID Privacy Models in Front of a Court

    In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited model which includes mutual authentication protocols. Recently, Armknecht et al. published two papers in ACNS 2010 and Transactions on Computational Science that...

    Provided By Sharif University of Technology

  • White Papers // Nov 2011

    One-Hop Throughput of Wireless Networks With Random Connections

    Wireless networks are subject to fundamental limitations in establishing source-destination data sessions. Investigating such limitations, along with discovering potential communication capabilities of wireless networks is of vital importance in designing efficient and practical algorithms for their operation. While Shannon's approach to mathematical analysis of communication systems is the most powerful...

    Provided By Sharif University of Technology

  • White Papers // Apr 2011

    Reconciling Operational and Epistemic Approaches to the Formal Analysis of Crypto-Based Security Protocols

    The authors propose a unifying framework for formal specification and verification of both epistemic and behavioral aspects of security protocols. The main novelty of the proposed framework is the explicit support for cryptographic constructs, which is among the most essential ingredients of security protocols. Due to this feature, the indistinguishability...

    Provided By Sharif University of Technology

  • White Papers // Mar 2011

    A New Secret Key Agreement Scheme in a Four- Terminal Network

    A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and...

    Provided By Sharif University of Technology

  • White Papers // Mar 2011

    Beyond the Cut Set Bound: Uncertainty Computations in Network Coding With Correlated Sources

    Cut-set bounds on achievable rates for network communication protocols are not in general tight. In this paper the authors introduce a new technique for proving converses for the problem of transmission of correlated sources in networks that result in bounds that are tighter than the corresponding cut-set bounds. The technique...

    Provided By Sharif University of Technology

  • White Papers // Feb 2011

    A Hybrid Global Minimization Scheme for Accurate Source Localization in Sensor Networks

    The authors consider the localization problem of multiple wideband sources by coherently taking into account the attenuation characteristics and the time delays in the reception of the signal. The proposed method leaves the space for unavailability of an accurate signal attenuation model in the environment by considering the model as...

    Provided By Sharif University of Technology

  • White Papers // Dec 2010

    Almost-Optimum Signature Matrices in Binary-Input Synchronous Overloaded CDMA

    The everlasting bandwidth limitations in wireless communication networks has directed the researchers' thrust toward analyzing the prospect of overloaded Code Division Multiple Access (CDMA). In this paper, the authors have proposed a Genetic Algorithm in search of optimum signature matrices for binary-input synchronous CDMA. The main measure of optimality considered...

    Provided By Sharif University of Technology

  • White Papers // Nov 2010

    Energy and Utility Optimization in Wireless Networks With Random Access

    Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks' nodes work properly without recharging or substituting batteries. Another criterion for network performance is data transmission rate which is usually quantified by a network utility function. There exists an inherent tradeoff between...

    Provided By Sharif University of Technology

  • White Papers // Nov 2010

    Delay Constrained Utility Maximization in Multihop Random Access Networks

    Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks, however proposed algorithms result in large transmission delays. In this paper,...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    Collaborative Information System Architecture for CAD/CAM in New Product Development Based on STEP Standard

    In today's competitive market, information technology tools play a most important role in new product development. Integrated design includes CAD, process planning and CNC code generation. The commercialized CAD/CAM software solutions and industrial systems can be acquired readily. These solutions or systems, however, cannot connect together in a seamless way,...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    Wireless Sensor Networks Topology Control: A Distributed, Power Efficient and Fair Algorithm

    Wireless sensor networks are multi-hop randomly distributed networks which collect environmental data and send them to some sink nodes. These networks are different from other wireless networks in several aspects; most distinct one is vital effect of power limitations there. This limitation means they must be in sleep mode as...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    QoS-Aware Joint Policies in Cognitive Radio Networks

    One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi Secondary Users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, the authors propose a new method to find joint policies...

    Provided By Sharif University of Technology

  • White Papers // Sep 2010

    Equational Reasoning on Mobile Ad Hoc Networks

    The authors provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. They exploit an extended algebra called Computed Network Theory to axiomatize restricted broadcast. It allows one to define the behavior of an ad hoc network with respect to the underlying topologies. They give...

    Provided By Sharif University of Technology

  • White Papers // Aug 2010

    Secure Data Outsourcing Based on Threshold Secret Sharing; Towards a More Practical Solution

    Database outsourcing is a noteworthy solution to improve quality of services while reducing data management costs. When data is stored and processed out of the territory of its owner, security becomes the first concern. Confidentiality of the outsourced data, correctness assurance of query results, and preserving user's access privacy are...

    Provided By Sharif University of Technology

  • White Papers // Oct 2009

    A New Decoding Scheme for Errorless Codes for Overloaded CDMA With Active User Detection

    In a binary CDMA system, each user is assigned a binary signature vector. At each symbol interval, each user multiplies its symbol (which is +1 or -1) by its signature and sends it through the channel. At the receiver end, the summation of the transmitted vectors embedded in noise is...

    Provided By Sharif University of Technology

  • White Papers // Jul 2009

    Cellular Learning Automata Based Dynamic Channel Assignment Algorithms

    A solution to channel assignment problem in cellular networks is self-organizing channel assignment algorithm with distributed control. In this paper, the authors propose three cellular learning automata based dynamic channel assignment algorithms. In the first two algorithms, no information about the status of channels in the whole network will be...

    Provided By Sharif University of Technology

  • White Papers // Jun 2009

    A Solution For Transportation Planning In Supply Chain

    An advanced optimization system for Vehicle Routing and Scheduling Problems (VRSP), which is one of the Supply Chain Planning modules, is introduced. An object oriented system, Computer Aided Routing and Scheduling (CARS) can handle complicated distribution models using advanced heuristic optimization algorithms. To classify various types of routing and scheduling...

    Provided By Sharif University of Technology

  • White Papers // Jun 2009

    Analysis of Public-Key Cryptography for Wireless Sensor Networks Security

    With the widespread growth of applications of Wireless Sensor Networks (WSNs), the need for reliable security mechanisms these networks has increased manifold. Many security solutions have been proposed in the domain of WSN so far. These solutions are usually based on well-known cryptographic algorithms. In this paper, the authors have...

    Provided By Sharif University of Technology

  • White Papers // Jun 2009

    Tipover Stability Enhancement of Wheeled Mobile Manipulators Using an Adaptive Neuro-Fuzzy Inference Controller System

    In this paper an algorithm based on the adaptive neuro-fuzzy controller is provided to enhance the tip-over stability of mobile manipulators when they are subjected to predefined trajectories for the end-effector and the vehicle. The controller creates proper configurations for the manipulator to prevent the robot from being overturned. The...

    Provided By Sharif University of Technology

  • White Papers // Apr 2009

    Direction-of-Arrival Estimation for Temporally Correlated Narrowband Signals

    Signal direction-of-arrival estimation using an array of sensors has been the subject of intensive research and development during the last two decades. Efforts have been directed to both, better solutions for the general data model and to develop more realistic models. So far, many authors have assumed the data to...

    Provided By Sharif University of Technology

  • White Papers // Jan 2009

    Slepian-Wolf Coding Over Cooperative Networks

    The authors present sufficient conditions for multicasting a set of correlated sources over cooperative networks. They propose joint source-Wyner-Ziv encoding/sliding-window decoding scheme, in which each receiver considers an ordered partition of other nodes. Subject to this scheme, they obtain a set of feasibility constraints for each ordered partition. They consolidate...

    Provided By Sharif University of Technology

  • White Papers // Jan 2009

    Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)

    This paper introduces the Unsupervised Neural Net based Intrusion Detector (UNNID) system, which detects network-based intrusions and attacks using unsupervised neural networks. The system has facilities for training, testing, and tunning of unsupervised nets to be used in intrusion detection. Using the system, the author tested two types of unsupervised...

    Provided By Sharif University of Technology

  • White Papers // Jan 2009

    Truthful and Secure Routing in Ad Hoc Networks With Malicious and Selfish Nodes

    Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination...

    Provided By Sharif University of Technology

  • White Papers // Dec 2008

    Bounds on the Sum Capacity of Synchronous Binary CDMA Channels

    This paper obtains a family of lower bounds for the sum capacity of Code Division Multiple Access (CDMA) channels assuming binary inputs and binary signature codes in the presence of additive i.i.d. noise with an arbitrary distribution. The envelope of this family gives a relatively tight lower bound in terms...

    Provided By Sharif University of Technology

  • White Papers // Dec 2008

    Developing a Hybrid Method for Identifying Monitoring Nodes in Intrusion Detection Systems of MANET

    Nowadays with appearance of a wide range of wireless devices, security of Mobile Ad hoc Networks (MANET) became an important problem and Intrusion Detection System (IDS) can be deployed as a second line of defense in a MANET. In this paper, a monitoring nodes selection method with high battery power...

    Provided By Sharif University of Technology

  • White Papers // Dec 2008

    Two Dimensional Connectivity for Vehicular Ad-Hoc Networks

    In this paper, the authors focus on two-dimensional connectivity in sparse Vehicular Ad hoc NETworks (VANETs). In this respect, they find thresholds for the arrival rates of vehicles at entrances of a block of streets such that the connectivity is guaranteed for any desired probability. To this end, they exploit...

    Provided By Sharif University of Technology

  • White Papers // Dec 2008

    Bounds on the Sum Capacity of Synchronous Binary CDMA Channels

    This paper obtains a family of lower bounds for the sum capacity of Code Division Multiple Access (CDMA) channels assuming binary inputs and binary signature codes in the presence of additive i.i.d. noise with an arbitrary distribution. The envelope of this family gives a relatively tight lower bound in terms...

    Provided By Sharif University of Technology

  • White Papers // Dec 2008

    Developing a Hybrid Method for Identifying Monitoring Nodes in Intrusion Detection Systems of MANET

    Nowadays with appearance of a wide range of wireless devices, security of Mobile Ad hoc Networks (MANET) became an important problem and Intrusion Detection System (IDS) can be deployed as a second line of defense in a MANET. In this paper, a monitoring nodes selection method with high battery power...

    Provided By Sharif University of Technology

  • White Papers // Jan 2009

    Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)

    This paper introduces the Unsupervised Neural Net based Intrusion Detector (UNNID) system, which detects network-based intrusions and attacks using unsupervised neural networks. The system has facilities for training, testing, and tunning of unsupervised nets to be used in intrusion detection. Using the system, the author tested two types of unsupervised...

    Provided By Sharif University of Technology

  • White Papers // Aug 2010

    Secure Data Outsourcing Based on Threshold Secret Sharing; Towards a More Practical Solution

    Database outsourcing is a noteworthy solution to improve quality of services while reducing data management costs. When data is stored and processed out of the territory of its owner, security becomes the first concern. Confidentiality of the outsourced data, correctness assurance of query results, and preserving user's access privacy are...

    Provided By Sharif University of Technology

  • White Papers // Nov 2011

    Two RFID Privacy Models in Front of a Court

    In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited model which includes mutual authentication protocols. Recently, Armknecht et al. published two papers in ACNS 2010 and Transactions on Computational Science that...

    Provided By Sharif University of Technology

  • White Papers // Feb 2012

    A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles

    In this paper, a novel strong designated verifier signature scheme based on bilinear pairings with provable security in the standard model is proposed, while the existing ones are secure in the random oracle model. In 2007 and 2011, two strong designated verifier signature schemes in the standard model are proposed...

    Provided By Sharif University of Technology

  • White Papers // Mar 2012

    An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps

    In a Multistage Secret Sharing (MSSS) Scheme, the authorized subsets of participants could reconstruct a number of secrets in consecutive stages. A One-Stage Multisecret Sharing (OSMSS) Scheme is a special case of MSSS schemes that all secrets are recovered simultaneously. In these schemes, in addition to the individual shares, the...

    Provided By Sharif University of Technology

  • White Papers // Nov 2011

    One-Hop Throughput of Wireless Networks With Random Connections

    Wireless networks are subject to fundamental limitations in establishing source-destination data sessions. Investigating such limitations, along with discovering potential communication capabilities of wireless networks is of vital importance in designing efficient and practical algorithms for their operation. While Shannon's approach to mathematical analysis of communication systems is the most powerful...

    Provided By Sharif University of Technology

  • White Papers // Jul 2009

    Cellular Learning Automata Based Dynamic Channel Assignment Algorithms

    A solution to channel assignment problem in cellular networks is self-organizing channel assignment algorithm with distributed control. In this paper, the authors propose three cellular learning automata based dynamic channel assignment algorithms. In the first two algorithms, no information about the status of channels in the whole network will be...

    Provided By Sharif University of Technology

  • White Papers // Mar 2012

    A Survey for Load Balancing in Mobile WiMAX Networks

    Mobile Worldwide Interoperability for Microwave Access (Mobile WiMAX) is a wireless access technology based on IEEE 802.16e standard. Mobile WiMAX supports mobility, high utilization of radio resources, beneficial Quality of Service (QoS) framework, and flexible centralized scheduling, which are offered by connection oriented MAC layer. Due to the architecture of...

    Provided By Sharif University of Technology

  • White Papers // Nov 2010

    Energy and Utility Optimization in Wireless Networks With Random Access

    Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks' nodes work properly without recharging or substituting batteries. Another criterion for network performance is data transmission rate which is usually quantified by a network utility function. There exists an inherent tradeoff between...

    Provided By Sharif University of Technology

  • White Papers // Nov 2010

    Delay Constrained Utility Maximization in Multihop Random Access Networks

    Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks, however proposed algorithms result in large transmission delays. In this paper,...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    QoS-Aware Joint Policies in Cognitive Radio Networks

    One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi Secondary Users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, the authors propose a new method to find joint policies...

    Provided By Sharif University of Technology

  • White Papers // Apr 2009

    Direction-of-Arrival Estimation for Temporally Correlated Narrowband Signals

    Signal direction-of-arrival estimation using an array of sensors has been the subject of intensive research and development during the last two decades. Efforts have been directed to both, better solutions for the general data model and to develop more realistic models. So far, many authors have assumed the data to...

    Provided By Sharif University of Technology

  • White Papers // Dec 2008

    Two Dimensional Connectivity for Vehicular Ad-Hoc Networks

    In this paper, the authors focus on two-dimensional connectivity in sparse Vehicular Ad hoc NETworks (VANETs). In this respect, they find thresholds for the arrival rates of vehicles at entrances of a block of streets such that the connectivity is guaranteed for any desired probability. To this end, they exploit...

    Provided By Sharif University of Technology

  • White Papers // Apr 2011

    Reconciling Operational and Epistemic Approaches to the Formal Analysis of Crypto-Based Security Protocols

    The authors propose a unifying framework for formal specification and verification of both epistemic and behavioral aspects of security protocols. The main novelty of the proposed framework is the explicit support for cryptographic constructs, which is among the most essential ingredients of security protocols. Due to this feature, the indistinguishability...

    Provided By Sharif University of Technology

  • White Papers // Jun 2009

    Tipover Stability Enhancement of Wheeled Mobile Manipulators Using an Adaptive Neuro-Fuzzy Inference Controller System

    In this paper an algorithm based on the adaptive neuro-fuzzy controller is provided to enhance the tip-over stability of mobile manipulators when they are subjected to predefined trajectories for the end-effector and the vehicle. The controller creates proper configurations for the manipulator to prevent the robot from being overturned. The...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    Wireless Sensor Networks Topology Control: A Distributed, Power Efficient and Fair Algorithm

    Wireless sensor networks are multi-hop randomly distributed networks which collect environmental data and send them to some sink nodes. These networks are different from other wireless networks in several aspects; most distinct one is vital effect of power limitations there. This limitation means they must be in sleep mode as...

    Provided By Sharif University of Technology

  • White Papers // Sep 2010

    Equational Reasoning on Mobile Ad Hoc Networks

    The authors provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. They exploit an extended algebra called Computed Network Theory to axiomatize restricted broadcast. It allows one to define the behavior of an ad hoc network with respect to the underlying topologies. They give...

    Provided By Sharif University of Technology

  • White Papers // Jun 2009

    A Solution For Transportation Planning In Supply Chain

    An advanced optimization system for Vehicle Routing and Scheduling Problems (VRSP), which is one of the Supply Chain Planning modules, is introduced. An object oriented system, Computer Aided Routing and Scheduling (CARS) can handle complicated distribution models using advanced heuristic optimization algorithms. To classify various types of routing and scheduling...

    Provided By Sharif University of Technology

  • White Papers // Jan 2009

    Truthful and Secure Routing in Ad Hoc Networks With Malicious and Selfish Nodes

    Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    Collaborative Information System Architecture for CAD/CAM in New Product Development Based on STEP Standard

    In today's competitive market, information technology tools play a most important role in new product development. Integrated design includes CAD, process planning and CNC code generation. The commercialized CAD/CAM software solutions and industrial systems can be acquired readily. These solutions or systems, however, cannot connect together in a seamless way,...

    Provided By Sharif University of Technology

  • White Papers // Jun 2009

    Analysis of Public-Key Cryptography for Wireless Sensor Networks Security

    With the widespread growth of applications of Wireless Sensor Networks (WSNs), the need for reliable security mechanisms these networks has increased manifold. Many security solutions have been proposed in the domain of WSN so far. These solutions are usually based on well-known cryptographic algorithms. In this paper, the authors have...

    Provided By Sharif University of Technology

  • White Papers // Oct 2009

    A New Decoding Scheme for Errorless Codes for Overloaded CDMA With Active User Detection

    In a binary CDMA system, each user is assigned a binary signature vector. At each symbol interval, each user multiplies its symbol (which is +1 or -1) by its signature and sends it through the channel. At the receiver end, the summation of the transmitted vectors embedded in noise is...

    Provided By Sharif University of Technology

  • White Papers // Feb 2011

    A Hybrid Global Minimization Scheme for Accurate Source Localization in Sensor Networks

    The authors consider the localization problem of multiple wideband sources by coherently taking into account the attenuation characteristics and the time delays in the reception of the signal. The proposed method leaves the space for unavailability of an accurate signal attenuation model in the environment by considering the model as...

    Provided By Sharif University of Technology

  • White Papers // Mar 2011

    Beyond the Cut Set Bound: Uncertainty Computations in Network Coding With Correlated Sources

    Cut-set bounds on achievable rates for network communication protocols are not in general tight. In this paper the authors introduce a new technique for proving converses for the problem of transmission of correlated sources in networks that result in bounds that are tighter than the corresponding cut-set bounds. The technique...

    Provided By Sharif University of Technology

  • White Papers // Mar 2011

    A New Secret Key Agreement Scheme in a Four- Terminal Network

    A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and...

    Provided By Sharif University of Technology

  • White Papers // Dec 2010

    Almost-Optimum Signature Matrices in Binary-Input Synchronous Overloaded CDMA

    The everlasting bandwidth limitations in wireless communication networks has directed the researchers' thrust toward analyzing the prospect of overloaded Code Division Multiple Access (CDMA). In this paper, the authors have proposed a Genetic Algorithm in search of optimum signature matrices for binary-input synchronous CDMA. The main measure of optimality considered...

    Provided By Sharif University of Technology

  • White Papers // Jan 2009

    Slepian-Wolf Coding Over Cooperative Networks

    The authors present sufficient conditions for multicasting a set of correlated sources over cooperative networks. They propose joint source-Wyner-Ziv encoding/sliding-window decoding scheme, in which each receiver considers an ordered partition of other nodes. Subject to this scheme, they obtain a set of feasibility constraints for each ordered partition. They consolidate...

    Provided By Sharif University of Technology