757 research outputs found
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be
provided by the asymmetric key model. With the evolution of new applications
such as mobile commerce, it is essential to provide secure and efficient
solutions for the mobile environments. The traditional public key cryptography
involves huge computational costs and is not so suitable for the
resource-constrained platforms. The elliptic curve-based approaches as the
newer solutions require certain considerations that are not taken into account
in the traditional public key infrastructures. The main contribution of this
paper is to introduce a Lightweight Public Key Infrastructure (LPKI) for the
constrained platforms such as mobile phones. It takes advantages of elliptic
curve cryptography and signcryption to decrease the computational costs and
communication overheads, and adapting to the constraints. All the computational
costs of required validations can be eliminated from end-entities by
introduction of a validation authority to the introduced infrastructure and
delegating validations to such a component. LPKI is so suitable for mobile
environments and for applications such as mobile commerce where the security is
the great concern.Comment: 6 Pages, 6 Figure
SSMS - A Secure SMS Messaging Protocol for the M-payment Systems
The GSM network with the greatest worldwide number of users, succumbs to
several security vulnerabilities. The short message service (SMS) is one of its
superior and well-tried services with a global availability in the GSM
networks. The main contribution of this paper is to introduce a new secure
application layer protocol, called SSMS, to efficiently embed the desired
security attributes in the SMS messages to be used as a secure bearer in the
m-payment systems. SSMS efficiently embeds the confidentiality, integrity,
authentication, and non-repudiation in the SMS messages. It provides an
elliptic curve-based public key solution that uses public keys for the secret
key establishment of a symmetric encryption. It also provides the attributes of
public verification and forward secrecy. It efficiently makes the SMS messaging
suitable for the m-payment applications where the security is the great
concern.Comment: 6 Pages, 5 Figure
A new approach to content-based file type detection
File type identification and file type clustering may be difficult tasks that
have an increasingly importance in the field of computer and network security.
Classical methods of file type detection including considering file extensions
and magic bytes can be easily spoofed. Content-based file type detection is a
newer way that is taken into account recently. In this paper, a new
content-based method for the purpose of file type detection and file type
clustering is proposed that is based on the PCA and neural networks. The
proposed method has a good accuracy and is fast enough.Comment: 6 Pages, 5 Figure, 2 Table
Distributed control strategy for DC microgrids based on average consensus and fractional-order local controllers
A novel distributed secondary layer control strategy based on average consensus and fractional-order proportional-integral (FOPI) local controllers is proposed for the regulation of the bus voltages and energy level balancing of the energy storage systems (ESSs) in DC microgrids. The distributed consensus protocol works based on an undirected sparse communication network. Fractional-order local controllers increase the degree of freedom in the tuning of closed-loop controllers, which is required for DC microgrids with high order dynamics. Therefore, here, FOPI local controllers are proposed for enhanced energy balancing of ESSs and improved regulation of the bus voltages across the microgrid. The proposed control strategy operates in both islanded and grid-connected modes of a DC microgrid. In both modes, the average voltage of the microgrid converges to the microgrid desired reference voltage. The charging/discharging of ESSs is controlled independent of the microgrid operating mode to maintain a balanced energy level. The performance of the proposed distributed control strategy is validated in a 38- V DC microgrid case study, simulated by Simulink real-time desktop, consisting of 10 buses and a photovoltaic renewable energy source
Appropriate strategies for designing contemporary art museums with the aim of attracting more people in sociocultural spaces of the country ( case study: Sari, Mazandaran)
Museums that are brimful of precious cultural treasures and indicate the identity of a society reflect human thought and artistic creativity during different generations and can convey concepts to visitors through its public displays. Withthe assumptionthatthe museumscanenrich the culture of a country youngcommunity, this study has triedtotargetitsresearchtoinvestigateways toimprove the design ofthe contemporary art museumin Mazandaran. Therefore,using theSPSS softwaresample size was estimated 384 based on Morgan table, among which55.7% were men and 44.3% were women. According tothesignificance level that wasless than 0.05, the frequencydifferencebetween the two groups of responses turned out to be significantat 99%. So the assumption that qualitative factors such as (aesthetic style designed for the set, easy access to the collections and availability of educational facilities) compared to individual and social factors such as (users' cultural and social conditions, visitors' economic situation, the sense of peace created by the presence of people in the building, etc.) have a greater impact on the category of visiting a museum is accepted.Keywords: museum, contemporary art, cultural interaction, public place
Recommended from our members
Management of information technology in Swedish firms: An empirical study
This study examines the role and the involvement of management in information technology acquisition, planning, and development. The results indicate that top management plays a major role in setting the overall information technology policies. In addition, the Chief Information Officer (CIO) plays a crucial role in the merger of information strategy and corporate strategy. The result also indicates that user\u27s satisfaction is considered to be the most important r factor for justification of information technology acquisition
- …