Do you want to publish a course? Click here

This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several chaos based ciphers. Using the well-known principles in the cryptanalysis we show that these ciphers do not behave worse than the standard ones, opening in this way a novel approach to the design of block encryption ciphers.
Due to fundamental changes in the market, from mass customization and increasing production to product- services management, this led to the emergence of a fundamental and necessary systems aims to achieve cooperation between enterprises (such as the exchange of services among them) in order to meet the requirements of all users and customers. Achieving this goal requires to the enterprise (the market in general) find a way to meet the needs of users simultaneously and verifying structured cooperation based on the request. And therefore we must work on the infrastructure of enterprise to exchange business information in a flexible, secure and adapted way to the needs of customers. Unfortunately all approaches exist to engineering and organize the enterprises, and existing information systems technologies lack the flexibility to respond appropriately and essentially to the requirements of enterprises which based on the principle of the cooperation and exchange the services. To overcome this problem we propose a new approach aims to reorganize the enterprises to groups of industrial services to exchange information, and taking into account the industrial constraints during the reorganization and assembly the business services.
This research shed light on the concept of human security and the new values it adds to the current concepts in international law. It starts with identifying human security and its elements and the main mechanism to achieve it, through what will be presented of the work of publicists and international bodies. Then it proceeds to the international changes that led to its appearance, and the criticisms that were directed to this concepts, and the main international bodies that work in this field, whether inside or out side the structure of the United Nations, to conclude with the similarities and diffrences between human security one the first hand and human rights and traditonal concepts of security on the other had.
Wireless sensor network have become widely used in many civil and military issues. Like all other network, it is exposed to attacks but its simplicity structured (CPU & memory) prevent the traditional defense technic to be applied, so they need a s pecial for defense. Most security researches focus on data righteousness and privacy, in this research we focus on attacks that aimed to the power resources which are referred as Denial Of Sleep attacks (DoS), in this attacks the attacker try to keep the sensor in active phase causing the power source to be drained very quickly so that it is a very dangerous attack. In this research we reviewed the sources of energy Loss in wireless sensor network and classified the attacks that target the power resource, we built a simulation module to analysis the B-MAC protocol response to denial of sleep attacks.
This research includes a set of mathematical models for simulating the financial activities. Worked models are determined to approve the form of inflows to the bank and outflows. We tried to study different types of banks, and performed some condi tions to make sure that the bank is working in stabilized situation. Furthermore, we identified the factors affecting the achievement of stability. These models allow more flexibility in the discussion and analysis of banking operations, helping to discern periods approaching the crisis and draw attention to the overall status of the bank. Analyzing these models gives additional time to control withdrawal and take the necessary decision at the time.
This research has been implemented in Homs city-Syria, in order to study the configuration of the road network in residential district, and the debates about the most efficient pattern in terms of functional performance, treeor grid pattern, or oth er patterns. In order to do that, it focused on the planning principles of functional performance, which can be summarized to:( proximity, permeability, security). And worked on identifying Accurately the functional performance indicators, and there measuring method, and they were (Cell / Cul ratio – T / X ratio- distant between the center and the periphery - number of cells per unit area –hierarchy). And applied it on the case studies: (organized / newly planned residential districts). It turns out that the road network should have a medium proximity and permeability for traffic,while it should be high for pedestrian. Therefore,the network patternCandidate forbetterfunctional performance when it's nearly in the mid-way between (tree and grid).
We present in this thesis a new structure that incorporates SDN with Vanets, and we make a meticulous study of routing mechanisms and their effects on security aspects. We also present a new security system that depends on public key infrastructure, and finally we demonstrate how to benefit from SDN in facing several security attacks and preaches, which are common in traditional Vanets, through number of security algorithms which allow deploying intrusion detection systems as a step towards self-healing and self-configuration system.
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign looking for patterns in financial transactions to discover illegal activities. From this perspective it wa s just a matter of time for the discipline to reach the important area of computer security This research presents a collection of research efforts on the use of data mining in computer security.
There are many of Formal Methods for testing security protocols detecting being safe or not. Including Avispa, Casper, ProVerif, Scyther. Previously a comparisons using two of mentioned methods (ProVerif, Scyther). In this, research a comparison b etween the four mentioned methods in terms of the same used parameters in the previous comparison: working style, the modeling language, user interface, input, and output. As a result, the user provided with options to choose the appropriate method depending on the desired parameter. Six different of security protocols have been tested and finally the results have been compared; these protocols are Kao Chow Authentication Protocol, 3-D Secure Protocol, Needham-Schroeder Public Key Protocol, Diffie–Hellman key exchange, Andrew Secure RPC Protocol, and Challenge Handshake Authentication Protocol
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا