This paper is devoted to the analysis of the impact of chaos-based
techniques on block encryption ciphers. We present several chaos
based ciphers. Using the well-known principles in the cryptanalysis
we show that these ciphers do not behave worse
than the standard
ones, opening in this way a novel approach to the design of block
encryption ciphers.
Due to fundamental changes in the market, from mass customization and increasing production to product- services management, this led to the emergence of a fundamental and necessary systems aims to achieve cooperation between enterprises (such as the
exchange of services among
them) in order to meet the requirements of all users and customers. Achieving this goal requires to the enterprise (the market in general) find a way to meet the needs of users simultaneously and verifying structured cooperation based
on the request. And therefore we must work on the infrastructure of enterprise to exchange business information in a flexible, secure and adapted way to the needs of customers. Unfortunately all approaches exist to engineering and organize the enterprises, and existing information systems technologies lack the flexibility to respond appropriately and essentially to the requirements of enterprises which based on the principle of the cooperation
and exchange the services.
To overcome this problem we propose a new approach aims to reorganize the enterprises to groups of industrial services to exchange information, and taking into account the industrial constraints during the reorganization and assembly the business services.
This research shed light on the concept of human security and the new values it adds
to the current concepts in international law. It starts with identifying human security
and its elements and the main mechanism to achieve it, through what will be
presented of the work of publicists and international bodies. Then it proceeds to the
international changes that led to its appearance, and the criticisms that were
directed to this concepts, and the main international bodies that work in this field,
whether inside or out side the structure of the United Nations, to conclude with the
similarities and diffrences between human security one the first hand and human
rights and traditonal concepts of security on the other had.
Wireless sensor network have become widely used in many civil and military issues.
Like all other network, it is exposed to attacks but its simplicity structured (CPU &
memory) prevent the traditional defense technic to be applied, so they need a s
pecial for
defense.
Most security researches focus on data righteousness and privacy, in this research we
focus on attacks that aimed to the power resources which are referred as Denial Of Sleep
attacks (DoS), in this attacks the attacker try to keep the sensor in active phase causing the
power source to be drained very quickly so that it is a very dangerous attack.
In this research we reviewed the sources of energy Loss in wireless sensor network
and classified the attacks that target the power resource, we built a simulation module to
analysis the B-MAC protocol response to denial of sleep attacks.
This research includes a set of mathematical models for simulating the financial
activities. Worked models are determined to approve the form of inflows to the bank and
outflows.
We tried to study different types of banks, and performed some condi
tions to make
sure that the bank is working in stabilized situation. Furthermore, we identified the factors
affecting the achievement of stability. These models allow more flexibility in the
discussion and analysis of banking operations, helping to discern periods approaching the
crisis and draw attention to the overall status of the bank. Analyzing these models gives
additional time to control withdrawal and take the necessary decision at the time.
This research has been implemented in Homs city-Syria, in order to study the
configuration of the road network in residential district, and the debates about the most
efficient pattern in terms of functional performance, treeor grid pattern, or oth
er patterns.
In order to do that, it focused on the planning principles of functional performance, which
can be summarized to:( proximity, permeability, security). And worked on identifying
Accurately the functional performance indicators, and there measuring method, and they
were (Cell / Cul ratio – T / X ratio- distant between the center and the periphery - number
of cells per unit area –hierarchy). And applied it on the case studies: (organized / newly
planned residential districts). It turns out that the road network should have a medium
proximity and permeability for traffic,while it should be high for pedestrian. Therefore,the
network patternCandidate forbetterfunctional performance when it's nearly in the mid-way
between (tree and grid).
In this research, the reliability and security weakness of the existing
CDMA are studied and analyzed.
We present in this thesis a new structure that incorporates SDN with Vanets, and we make a meticulous study of routing mechanisms and their effects on security aspects. We also present a new security system that depends on public key infrastructure,
and finally we demonstrate how to benefit from SDN in facing several security attacks and preaches, which are common in traditional Vanets, through number of security algorithms which allow deploying intrusion detection systems as a step towards self-healing and self-configuration system.
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign looking for patterns in financial transactions to discover illegal activities. From this perspective it wa
s just a matter of time for the discipline to reach the important area of computer security This research presents a collection of research efforts on the use of data mining in computer security.
There are many of Formal Methods for testing security protocols detecting being safe
or not. Including Avispa, Casper, ProVerif, Scyther. Previously a comparisons using two
of mentioned methods (ProVerif, Scyther).
In this, research a comparison b
etween the four mentioned methods in terms of the
same used parameters in the previous comparison: working style, the modeling language,
user interface, input, and output. As a result, the user provided with options to choose the
appropriate method depending on the desired parameter.
Six different of security protocols have been tested and finally the results have been
compared; these protocols are Kao Chow Authentication Protocol, 3-D Secure Protocol,
Needham-Schroeder Public Key Protocol, Diffie–Hellman key exchange, Andrew Secure
RPC Protocol, and Challenge Handshake Authentication Protocol