ORIGINAL_ARTICLE
Editorial Note
http://jcomsec.ui.ac.ir/article_21845_92a3d938e926442a2f0df90024c64f0d.pdf
2014-01-01T11:23:20
2020-05-31T11:23:20
1
2
Ahmad
Naghsh-Nilchi
nilchi@yahoo.com
true
1
University of Isfahan
University of Isfahan
University of Isfahan
LEAD_AUTHOR
ORIGINAL_ARTICLE
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing
Correctness verification of query results is an important security concern in data outsourcing scenarios. In previous approaches, the correctness verification was impossible in real applications due to its high overhead. A trust-based approach is proposed here to reduce the correctness verification overhead which relies on the previous positive behavior of service provider. A client maintains a trust value for service provider showing the history of service provider comportment. Considering the trust value, the client selects a portion of query result randomly, and forwards it toward the data owner as a result-proof request. The data owner responses to the correctness of the result-proof request using a bloom filter structure. Based on the result-proof response and the trust in the service provider, the client decides whether to accept or reject its query result. In terms of performance, this approach outperforms previous approaches since it does not contain signature overhead in the verification process (which is presented by simulation results). In terms of correctness, this approach is modeled using a transition system and the correctness properties are verified through the Linear Temporal Logic.
http://jcomsec.ui.ac.ir/article_21846_6426173e4db46dd096815a000827fce7.pdf
2014-01-01T11:23:20
2020-05-31T11:23:20
3
14
Data Outsourcing
Correctness Verification
Linear Temporal Logic
Bloom Filter
Morteza
Noferesti
mnoferesti@ce.sharif.edu
true
1
LEAD_AUTHOR
Simin
Ghasemi
sghasemi@ce.sharif.edu
true
2
AUTHOR
Mohammad Ali
Hadavi
mhadavi@ce.sharif.edu
true
3
AUTHOR
Rasool
Jalili
jalili@sharif.edu
true
4
AUTHOR
ORIGINAL_ARTICLE
Unified Byte Permutations for the Block Cipher 3D
3D is a 512-bit block cipher whose design is inspired from the Advanced Encryption Standard (AES). Like the AES, each round of 3D is composed of 4 transformations including a round-key addition, a byte-wise substitution, a byte-wise shuffle and an MDS matrix multiplication. In 3D, two distinct byte-wise permutations are employed for odd and even rounds. In this paper, using concepts from graph theory, we design a unified byte permutation for both odd and even rounds with the same diffusion property as the original cipher. The main advantage of this new transformation is in hardware implementation of the cipher where with less resources we can speed up the encryption/decryption process.
http://jcomsec.ui.ac.ir/article_21847_7ad469a65bf4bcfb5f9743202e0c69f8.pdf
2014-01-01T11:23:20
2020-05-31T11:23:20
15
22
Block Cipher 3D
Diffusion
Graph Theory
Order/Degree Problem
Permutation
Hamid
Mala
hamidmala2003@yahoo.com
true
1
Department of Information Technology Engineering, University of Isfahan
Department of Information Technology Engineering, University of Isfahan
Department of Information Technology Engineering, University of Isfahan
LEAD_AUTHOR
ORIGINAL_ARTICLE
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks
Sensor networks are eligible candidates for military and scientific applications such as border security and environmental monitoring. They are usually deployed in unattended or hostile environments; therefore, security is a major concern with these networks. A fundamental requirement is the capability to establish pairwise keys between sensors. Many key establishment protocols have been proposed to address the security issues in wireless sensor networks. However, most of these protocols have security and/or performance restriction. In this article, we propose a new key establishment protocol based on symmetric polynomials and random key pre-distribution. In our protocol, contrary to others, we use several symmetric polynomials to generate polynomial shares for a group of sensors, and the distribution of polynomial shares to each sensor is done using a combinatorial design. Since a limited number of shares are generated from a symmetric polynomial, the polynomial degree is very low. As a result, the common key between sensors can be generated without imposing significant overhead to them. Further, in the proposed protocol, key establishment between near sensors is provided via symmetric polynomials, while key establishment between far sensors is accomplished via random key pre-distribution. Using these two techniques simultaneously allows end to end key establishment between every pair of sensors with reasonable overhead.
http://jcomsec.ui.ac.ir/article_21848_d7442aa324e254d89494092e6567ab87.pdf
2014-01-01T11:23:20
2020-05-31T11:23:20
23
38
Wireless Sensor Networks
Key Management
Network Security
Random Key Pre-distribution
Symmetric Polynomial
Deployment Knowledge
Combi natorial Design
Ali
Fanian
a.fanian@cc.iut.ac.ir
true
1
Professor Assistance in isfahan university of thecnology
Professor Assistance in isfahan university of thecnology
Professor Assistance in isfahan university of thecnology
LEAD_AUTHOR
Mehdi
Berenjkoub
brnjkb@cc.iut.ac.ir
true
2
Assistance Professor in Isfahan University of Technology
Assistance Professor in Isfahan University of Technology
Assistance Professor in Isfahan University of Technology
AUTHOR
ORIGINAL_ARTICLE
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images
Blind image steganalysis is a technique for discovering the message hidden in images in an independent manner than embedding the hidden message. The content of the image contribute to the success of steganalysis drastically. In the past, texture, one of the most basic features in any image processing, has been used for content-based image classification. Correlogram properties as textural based features have numerous applications in this field. Homogeneity, contrast, correlation, energy and entropy are the correlogram properties used more frequently than others for this purpose. In this article, the impacts of these properties, as descriptors for image content, on blind steganalysis in JPEG image are investigated. The results indicate that when correlogram homogeneity increases, the false image detection of blind steganalysis increases accordingly; while, decrease in correlogram contrast and entropy, leads to an increase in error. The energy and correlation of correlogram have unspecified effects on image blind steganalysis.
http://jcomsec.ui.ac.ir/article_21849_83a087aab3a4405f91867286ab71f062.pdf
2014-01-01T11:23:20
2020-05-31T11:23:20
39
46
Correlogram Properties
Blind Steganalysis
Cover Selection
JPEG Image
Dariush
Alimoradi
d.alimoradi@shahed.ac.ir
true
1
Shahed University
Shahed University
Shahed University
AUTHOR
Maryam
Hasanzadeh
hasanzadeh@shahed.ac.ir
true
2
Shahed Univerity
Shahed Univerity
Shahed Univerity
LEAD_AUTHOR
ORIGINAL_ARTICLE
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation
The linear manifold topographic map (LMTM) is a model for unsupervised learning of multiple low-dimensional linear manifolds from a set of data samples in a topology-preserving map. Several limitations exist in LMTM and many other topographic maps that relate to their fixed topology and fixed number of representation elements or neurons. In this paper, a growing hierarchical structure is proposed for LMTM, to remove these limitations, and to be able to take advantage of the possible hierarchical nature of the datasets. The attempt is made to avoid several existing problems in the similar hierarchical and growing structures, through this proposed algorithm. Experimental results indicate the proper performance of the model on a synthesized and two real-world problems. In the first experiment, a complex manifold constituted of a circle, a line, and a sinusoidal part is properly represented by the proposed model. In the second and third sets of the experiments, the superiority of the proposed model is shown in comparison with the other related methods on an image compression problem and a handwritten digit recognition application.
http://jcomsec.ui.ac.ir/article_21850_8317105884979091da83e4772ff4a3a5.pdf
2014-01-01T11:23:20
2020-05-31T11:23:20
47
59
Unsup ervised Learning
Linear Manifold Top ographic Map
Growing
H ierarchical
Peyman
Adibi
adibi@eng.ui.ac.ir
true
1
LEAD_AUTHOR
ORIGINAL_ARTICLE
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound
Routing methods for optimal distribution of traffic in data networks that can also provide quality of service (QoS) for users is one of the challenges in recent years' research on next generation networks. The major QoS requirement in most cases is an upper bound on end-to-end path delay. In multipath virtual circuit switched networks each session distributes its traffic among a set of available paths. If all possible paths are considered available, then the source's decision on its traffic distribution can be considered as routing. A model of the routing function as a mathematical problem which distributes the input traffic over possible paths for each session is proposed here. A distributed and iterative algorithm which will keep the average end-to-end delay for individual paths below a required bound is introduced. This algorithm minimizes the total average delay of all packets in the network. The convergence of the algorithm is illustrated.
http://jcomsec.ui.ac.ir/article_21851_f6c6bacc9b36517cf22901f13f493be7.pdf
2014-01-01T11:23:20
2020-05-31T11:23:20
61
71
Traffic Distribution
Routing
Convex Optimization
Subgradient Method
Touraj
Shabanian
shabanian@ec.iut.ac.ir
true
1
Isfahan University of Technology
Isfahan University of Technology
Isfahan University of Technology
LEAD_AUTHOR
Massoud
Hashemi
hashemim@cc.iut.ac.ir
true
2
Department of Electrical and Computer Engineering , Isfahan University of Technology, Isfahan, Iran.
Department of Electrical and Computer Engineering , Isfahan University of Technology, Isfahan, Iran.
Department of Electrical and Computer Engineering , Isfahan University of Technology, Isfahan, Iran.
AUTHOR
Ahmad
Askarian
a.askarian@ec.iut.ac.ir
true
3
Department of Electrical and Computer Engineering , Isfahan University of Technology, Isfahan, Iran.
Department of Electrical and Computer Engineering , Isfahan University of Technology, Isfahan, Iran.
Department of Electrical and Computer Engineering , Isfahan University of Technology, Isfahan, Iran.
AUTHOR
Behnaz
Omoomi
bomoomi@cc.iut.ac.ir
true
4
Department of Mathematical Science, Isfahan University of Technology, Isfahan, Iran.
Department of Mathematical Science, Isfahan University of Technology, Isfahan, Iran.
Department of Mathematical Science, Isfahan University of Technology, Isfahan, Iran.
AUTHOR