Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Mehdi Berenjkoub"'
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 2, Pp 534-544 (2023)
The capability of a system to fulfill its mission promptly in the presence of attacks, failures, or accidents is one of the qualitative definitions of survivability. In this paper, we propose a model for survivability quantification, which is accepta
Externí odkaz:
https://doaj.org/article/59509891629a4690baf2904b42b3d9bb
Publikováno v:
IEEE Access, Vol 7, Pp 42798-42815 (2019)
Secure computation of scalar product is of considerable importance due to its central role in many practical computation scenarios with privacy and security requirements. This paper includes new results about the secure two-party scalar product. Spec
Externí odkaz:
https://doaj.org/article/61b144ff162f4009a6f5e3d4acec134e
Publikováno v:
International Journal of Information and Communication Technology Research, Vol 2, Iss 1, Pp 29-44 (2010)
The number of reported vulnerabilities is dramatically rising every year. In addition, the combination of different kinds of network devices, services and applications in a complex manner lead to increase the complexity of vulnerabilities. Increasing
Externí odkaz:
https://doaj.org/article/4eddaa280b9c4233b90479838b48e4fe
Publikováno v:
IET Information Security. 13:459-468
In a designated verifier signature (DVS) scheme, the validity of the signature can only be checked by a designated entity chosen by the signer. Furthermore, the designated entity cannot convince a third party that the signature is generated by the si
Publikováno v:
Information Sciences. 479:321-334
The notion of a Designated Verifier Signature (DVS) scheme allows a signer to create a signature which is only verifiable by an intended verifier. DVS is a very useful scheme for authenticating a signer without interfering with her privacy. In 2003,
Publikováno v:
IEEE Access, Vol 7, Pp 42798-42815 (2019)
Secure computation of scalar product is of considerable importance due to its central role in many practical computation scenarios with privacy and security requirements. This paper includes new results about the secure two-party scalar product. Spec
Autor:
Babak Siabi, Mehdi Berenjkoub
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:83-84
In this paper, we discuss the security of a distributed inner product (DIP) protocol [IEEE Trans. Inf. Forensics Security, 11.1, 59, (2016)]. We show information leakage in this protocol that does not happen in an ideal execution of the DIP functiona
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :710-720
Publikováno v:
Journal of Communications and Networks. 16:311-321
This paper focuses on contention-based Medium Access Control (MAC) protocols used in Wireless Local Area Networks (WLANs). We propose a novel MAC protocol called Adaptive Backoff Tuning MAC (ABTMAC) based on IEEE 802.11 DCF. In our proposed MAC proto
Autor:
Mehdi Berenjkoub, Parvin Rastegari
Publikováno v:
ISCISC
A certtificateless signcryption (CLSC) scheme is an important primitive in cryptographic protocols which provides the goals of signing and encryption, simultaneously. In 2010, Liu et al presented the first certificateless signcryption scheme in the s