Sharif University of Technology

Displaying 1-19 of 19 results

  • White Papers // Mar 2012

    An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps

    In a Multistage Secret Sharing (MSSS) Scheme, the authorized subsets of participants could reconstruct a number of secrets in consecutive stages. A One-Stage Multisecret Sharing (OSMSS) Scheme is a special case of MSSS schemes that all secrets are recovered simultaneously. In these schemes, in addition to the individual shares, the...

    Provided By Sharif University of Technology

  • White Papers // Mar 2012

    A Survey for Load Balancing in Mobile WiMAX Networks

    Mobile Worldwide Interoperability for Microwave Access (Mobile WiMAX) is a wireless access technology based on IEEE 802.16e standard. Mobile WiMAX supports mobility, high utilization of radio resources, beneficial Quality of Service (QoS) framework, and flexible centralized scheduling, which are offered by connection oriented MAC layer. Due to the architecture of...

    Provided By Sharif University of Technology

  • White Papers // Feb 2012

    A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles

    In this paper, a novel strong designated verifier signature scheme based on bilinear pairings with provable security in the standard model is proposed, while the existing ones are secure in the random oracle model. In 2007 and 2011, two strong designated verifier signature schemes in the standard model are proposed...

    Provided By Sharif University of Technology

  • White Papers // Nov 2011

    Two RFID Privacy Models in Front of a Court

    In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited model which includes mutual authentication protocols. Recently, Armknecht et al. published two papers in ACNS 2010 and Transactions on Computational Science that...

    Provided By Sharif University of Technology

  • White Papers // Nov 2011

    One-Hop Throughput of Wireless Networks With Random Connections

    Wireless networks are subject to fundamental limitations in establishing source-destination data sessions. Investigating such limitations, along with discovering potential communication capabilities of wireless networks is of vital importance in designing efficient and practical algorithms for their operation. While Shannon's approach to mathematical analysis of communication systems is the most powerful...

    Provided By Sharif University of Technology

  • White Papers // Apr 2011

    Reconciling Operational and Epistemic Approaches to the Formal Analysis of Crypto-Based Security Protocols

    The authors propose a unifying framework for formal specification and verification of both epistemic and behavioral aspects of security protocols. The main novelty of the proposed framework is the explicit support for cryptographic constructs, which is among the most essential ingredients of security protocols. Due to this feature, the indistinguishability...

    Provided By Sharif University of Technology

  • White Papers // Mar 2011

    A New Secret Key Agreement Scheme in a Four- Terminal Network

    A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and...

    Provided By Sharif University of Technology

  • White Papers // Mar 2011

    Beyond the Cut Set Bound: Uncertainty Computations in Network Coding With Correlated Sources

    Cut-set bounds on achievable rates for network communication protocols are not in general tight. In this paper the authors introduce a new technique for proving converses for the problem of transmission of correlated sources in networks that result in bounds that are tighter than the corresponding cut-set bounds. The technique...

    Provided By Sharif University of Technology

  • White Papers // Feb 2011

    A Hybrid Global Minimization Scheme for Accurate Source Localization in Sensor Networks

    The authors consider the localization problem of multiple wideband sources by coherently taking into account the attenuation characteristics and the time delays in the reception of the signal. The proposed method leaves the space for unavailability of an accurate signal attenuation model in the environment by considering the model as...

    Provided By Sharif University of Technology

  • White Papers // Dec 2010

    Almost-Optimum Signature Matrices in Binary-Input Synchronous Overloaded CDMA

    The everlasting bandwidth limitations in wireless communication networks has directed the researchers' thrust toward analyzing the prospect of overloaded Code Division Multiple Access (CDMA). In this paper, the authors have proposed a Genetic Algorithm in search of optimum signature matrices for binary-input synchronous CDMA. The main measure of optimality considered...

    Provided By Sharif University of Technology

  • White Papers // Nov 2010

    Energy and Utility Optimization in Wireless Networks With Random Access

    Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks' nodes work properly without recharging or substituting batteries. Another criterion for network performance is data transmission rate which is usually quantified by a network utility function. There exists an inherent tradeoff between...

    Provided By Sharif University of Technology

  • White Papers // Nov 2010

    Delay Constrained Utility Maximization in Multihop Random Access Networks

    Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks, however proposed algorithms result in large transmission delays. In this paper,...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    Collaborative Information System Architecture for CAD/CAM in New Product Development Based on STEP Standard

    In today's competitive market, information technology tools play a most important role in new product development. Integrated design includes CAD, process planning and CNC code generation. The commercialized CAD/CAM software solutions and industrial systems can be acquired readily. These solutions or systems, however, cannot connect together in a seamless way,...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    Wireless Sensor Networks Topology Control: A Distributed, Power Efficient and Fair Algorithm

    Wireless sensor networks are multi-hop randomly distributed networks which collect environmental data and send them to some sink nodes. These networks are different from other wireless networks in several aspects; most distinct one is vital effect of power limitations there. This limitation means they must be in sleep mode as...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    QoS-Aware Joint Policies in Cognitive Radio Networks

    One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi Secondary Users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, the authors propose a new method to find joint policies...

    Provided By Sharif University of Technology

  • White Papers // Sep 2010

    Equational Reasoning on Mobile Ad Hoc Networks

    The authors provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. They exploit an extended algebra called Computed Network Theory to axiomatize restricted broadcast. It allows one to define the behavior of an ad hoc network with respect to the underlying topologies. They give...

    Provided By Sharif University of Technology

  • White Papers // Aug 2010

    Secure Data Outsourcing Based on Threshold Secret Sharing; Towards a More Practical Solution

    Database outsourcing is a noteworthy solution to improve quality of services while reducing data management costs. When data is stored and processed out of the territory of its owner, security becomes the first concern. Confidentiality of the outsourced data, correctness assurance of query results, and preserving user's access privacy are...

    Provided By Sharif University of Technology

  • White Papers // Oct 2009

    A New Decoding Scheme for Errorless Codes for Overloaded CDMA With Active User Detection

    In a binary CDMA system, each user is assigned a binary signature vector. At each symbol interval, each user multiplies its symbol (which is +1 or -1) by its signature and sends it through the channel. At the receiver end, the summation of the transmitted vectors embedded in noise is...

    Provided By Sharif University of Technology

  • White Papers // Jan 2009

    Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)

    This paper introduces the Unsupervised Neural Net based Intrusion Detector (UNNID) system, which detects network-based intrusions and attacks using unsupervised neural networks. The system has facilities for training, testing, and tunning of unsupervised nets to be used in intrusion detection. Using the system, the author tested two types of unsupervised...

    Provided By Sharif University of Technology

  • White Papers // Jan 2009

    Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)

    This paper introduces the Unsupervised Neural Net based Intrusion Detector (UNNID) system, which detects network-based intrusions and attacks using unsupervised neural networks. The system has facilities for training, testing, and tunning of unsupervised nets to be used in intrusion detection. Using the system, the author tested two types of unsupervised...

    Provided By Sharif University of Technology

  • White Papers // Aug 2010

    Secure Data Outsourcing Based on Threshold Secret Sharing; Towards a More Practical Solution

    Database outsourcing is a noteworthy solution to improve quality of services while reducing data management costs. When data is stored and processed out of the territory of its owner, security becomes the first concern. Confidentiality of the outsourced data, correctness assurance of query results, and preserving user's access privacy are...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    Collaborative Information System Architecture for CAD/CAM in New Product Development Based on STEP Standard

    In today's competitive market, information technology tools play a most important role in new product development. Integrated design includes CAD, process planning and CNC code generation. The commercialized CAD/CAM software solutions and industrial systems can be acquired readily. These solutions or systems, however, cannot connect together in a seamless way,...

    Provided By Sharif University of Technology

  • White Papers // Nov 2011

    One-Hop Throughput of Wireless Networks With Random Connections

    Wireless networks are subject to fundamental limitations in establishing source-destination data sessions. Investigating such limitations, along with discovering potential communication capabilities of wireless networks is of vital importance in designing efficient and practical algorithms for their operation. While Shannon's approach to mathematical analysis of communication systems is the most powerful...

    Provided By Sharif University of Technology

  • White Papers // Mar 2012

    An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps

    In a Multistage Secret Sharing (MSSS) Scheme, the authorized subsets of participants could reconstruct a number of secrets in consecutive stages. A One-Stage Multisecret Sharing (OSMSS) Scheme is a special case of MSSS schemes that all secrets are recovered simultaneously. In these schemes, in addition to the individual shares, the...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    Wireless Sensor Networks Topology Control: A Distributed, Power Efficient and Fair Algorithm

    Wireless sensor networks are multi-hop randomly distributed networks which collect environmental data and send them to some sink nodes. These networks are different from other wireless networks in several aspects; most distinct one is vital effect of power limitations there. This limitation means they must be in sleep mode as...

    Provided By Sharif University of Technology

  • White Papers // Mar 2012

    A Survey for Load Balancing in Mobile WiMAX Networks

    Mobile Worldwide Interoperability for Microwave Access (Mobile WiMAX) is a wireless access technology based on IEEE 802.16e standard. Mobile WiMAX supports mobility, high utilization of radio resources, beneficial Quality of Service (QoS) framework, and flexible centralized scheduling, which are offered by connection oriented MAC layer. Due to the architecture of...

    Provided By Sharif University of Technology

  • White Papers // Nov 2010

    Energy and Utility Optimization in Wireless Networks With Random Access

    Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks' nodes work properly without recharging or substituting batteries. Another criterion for network performance is data transmission rate which is usually quantified by a network utility function. There exists an inherent tradeoff between...

    Provided By Sharif University of Technology

  • White Papers // Nov 2010

    Delay Constrained Utility Maximization in Multihop Random Access Networks

    Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks, however proposed algorithms result in large transmission delays. In this paper,...

    Provided By Sharif University of Technology

  • White Papers // Oct 2010

    QoS-Aware Joint Policies in Cognitive Radio Networks

    One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi Secondary Users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, the authors propose a new method to find joint policies...

    Provided By Sharif University of Technology

  • White Papers // Oct 2009

    A New Decoding Scheme for Errorless Codes for Overloaded CDMA With Active User Detection

    In a binary CDMA system, each user is assigned a binary signature vector. At each symbol interval, each user multiplies its symbol (which is +1 or -1) by its signature and sends it through the channel. At the receiver end, the summation of the transmitted vectors embedded in noise is...

    Provided By Sharif University of Technology

  • White Papers // Apr 2011

    Reconciling Operational and Epistemic Approaches to the Formal Analysis of Crypto-Based Security Protocols

    The authors propose a unifying framework for formal specification and verification of both epistemic and behavioral aspects of security protocols. The main novelty of the proposed framework is the explicit support for cryptographic constructs, which is among the most essential ingredients of security protocols. Due to this feature, the indistinguishability...

    Provided By Sharif University of Technology

  • White Papers // Sep 2010

    Equational Reasoning on Mobile Ad Hoc Networks

    The authors provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. They exploit an extended algebra called Computed Network Theory to axiomatize restricted broadcast. It allows one to define the behavior of an ad hoc network with respect to the underlying topologies. They give...

    Provided By Sharif University of Technology

  • White Papers // Feb 2011

    A Hybrid Global Minimization Scheme for Accurate Source Localization in Sensor Networks

    The authors consider the localization problem of multiple wideband sources by coherently taking into account the attenuation characteristics and the time delays in the reception of the signal. The proposed method leaves the space for unavailability of an accurate signal attenuation model in the environment by considering the model as...

    Provided By Sharif University of Technology

  • White Papers // Mar 2011

    A New Secret Key Agreement Scheme in a Four- Terminal Network

    A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and...

    Provided By Sharif University of Technology

  • White Papers // Mar 2011

    Beyond the Cut Set Bound: Uncertainty Computations in Network Coding With Correlated Sources

    Cut-set bounds on achievable rates for network communication protocols are not in general tight. In this paper the authors introduce a new technique for proving converses for the problem of transmission of correlated sources in networks that result in bounds that are tighter than the corresponding cut-set bounds. The technique...

    Provided By Sharif University of Technology

  • White Papers // Dec 2010

    Almost-Optimum Signature Matrices in Binary-Input Synchronous Overloaded CDMA

    The everlasting bandwidth limitations in wireless communication networks has directed the researchers' thrust toward analyzing the prospect of overloaded Code Division Multiple Access (CDMA). In this paper, the authors have proposed a Genetic Algorithm in search of optimum signature matrices for binary-input synchronous CDMA. The main measure of optimality considered...

    Provided By Sharif University of Technology

  • White Papers // Feb 2012

    A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles

    In this paper, a novel strong designated verifier signature scheme based on bilinear pairings with provable security in the standard model is proposed, while the existing ones are secure in the random oracle model. In 2007 and 2011, two strong designated verifier signature schemes in the standard model are proposed...

    Provided By Sharif University of Technology

  • White Papers // Nov 2011

    Two RFID Privacy Models in Front of a Court

    In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited model which includes mutual authentication protocols. Recently, Armknecht et al. published two papers in ACNS 2010 and Transactions on Computational Science that...

    Provided By Sharif University of Technology