- Cryptography and Data Security
- Internet Traffic Analysis and Secure E-voting
- Cryptographic Implementations and Security
- Advanced Malware Detection Techniques
- Rings, Modules, and Algebras
- Network Security and Intrusion Detection
- Coding theory and cryptography
- Chaos-based Image/Signal Encryption
- Advanced Topics in Algebra
- Advancements in PLL and VCO Technologies
- Peer-to-Peer Network Technologies
- Security in Wireless Sensor Networks
- Algebraic structures and combinatorial models
- Physical Unclonable Functions (PUFs) and Hardware Security
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Steganography and Watermarking Techniques
- Privacy-Preserving Technologies in Data
- Fuzzy and Soft Set Theory
- Caching and Content Delivery
- Cloud Data Security Solutions
- Cryptography and Residue Arithmetic
- Energy Efficient Wireless Sensor Networks
- Radio Frequency Integrated Circuit Design
- Imbalanced Data Classification Techniques
- Advanced Data Storage Technologies
University of Guilan
2014-2024
Islamic Azad University, Science and Research Branch
2013
Information Technology University
2013
Islamic Azad University, Bandar Anzali Branch
2011
Iran University of Science and Technology
2007-2010
Credit card plays a very important rule in today's economy. It becomes an unavoidable part of household, business and global activities. Although using credit cards provides enormous benefits when used carefully responsibly,significant financial damages may be caused by fraudulent Many techniques have been proposed to confront the growth fraud. However, all these same goal avoiding fraud; each one has its own drawbacks, advantages characteristics. In this paper, after investigating...
In this paper, a novel algorithm for image encryption based on SHA-512 is proposed. The main idea of the to use one half data other reciprocally. Distinct characteristics are high security, sensitivity and speed that can be applied gray-level color images. consists two sections: first does preprocessing operation shuffle image. second uses hash function generate random number mask. mask then XORed with part which going encrypted. aim work increase entropy. Both security performance aspects...
Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands small nodes such as MICA2, which operate autonomously; conditions cost, invisible deployment application domains, lead to size resource limited sensors [3]. WSNs are susceptible types link layer attacks [1] most traditional network security techniques unusable on [3]; This is due wireless shared nature communication channel, untrusted transmissions, in...
In this paper, a new simple and fast algorithm for image encryption is proposed.It exploits the scan patterns function XOR in three standalone steps.The decryption procedure similar to that of but reversed order.We implement test proposed using different sample inputs our experimental result security analysis indicates robustness advantages algorithm.Using it possible reproduce original with no loss information process.Algorithm enough be comparable other recent approaches, has passed all...
Abstract With the advent of new technologies and various services provided in context computer networks, a large volume data is being generated. The main challenge this area providing network protection against threats vulnerabilities. So far, many techniques have been proposed to deal with these threats. All pursue same goal, preventing attackers from reaching their objectives. A solution based on early warning system(s) (EWSs) what exactly security teams need manage properly. EWS, as...
Vehicular Ad-hoc Networks (VANETs) are the special class of Mobile (MANETs) with high mobility and frequent changes topology. Clustering is applied in VANETs to divide network into smaller groups mobile vehicles improve routing, information dissemination data gathering. In this paper, we propose a 2-layer stable clustering scheme based on adaptive multiple metric combining both features static dynamic methods. The cluster head selected among members new called suitability value. It derived...
Cloud computing is a new approach in the field of information technology and development computer technologies based on World Wide Web. One most important challenges this area security cloud computing. On other hand access to critical confidential banks, institutions etc extremely essential. Sometimes even with enormous costs, it not fully guaranteed compromised by attackers. In paper providing novel method, we improve data for company or any specific locations using location-based encryption.
Recently, involving wireless communication technologies in deployment of new vehicular networks becomes more attracting to the research community and vehicle manufacturers. It is beneficial providing intelligent transportation system as well assistant services drivers. However, limitation resources mobile vehicles a significant technical challenge applications. In this paper, we propose cloud architecture used clustering technique group provide cooperatively. We make cluster structure...
Recently, involving wireless communication technologies in deployment of new vehicular networks becomes more attracting to the research community and vehicle manufacturers. It is beneficial providing intelligent transportation system as well assistant services drivers. However, limitation resources mobile vehicles a significant technical challenge applications. In this paper, we propose cloud architecture used clustering technique group provide cooperatively. We make cluster structure...
Many methods are suggested to preserve anonymity of users for peer-to-peer (P2P) networks. Most these methods, by relying on established anonymous solutions client/server applications, presented unstructured P2P However, structured overlays, using distributed hash tables their routing, do not resemble traditional paradigms. Therefore, current cannot be implemented them easily. In this paper, we introduce structural-based tunneling (SBT) provide mutual circular structures. method, get help...
In recent years, there has been an increasing interest in the authentication process due to key role that it network security. Port Knocking (PKn) is method which data transmits through closed ports. This prone attacks when attackers sniff network. paper proposes a new called "Secure Knock-Tunneling" eliminate both DOS-Knocking and NATK-nocking attacks. The possibility of implementation this investigated on Mikrotik devices.
In this paper we propose a new architecture Physical Random Functions (or Unclonable Functions, PUFs) to create candidate hardware random number generator.So far several generators based on ring oscillators were introduced but all of them have either security or stability problems.This presents novel which has solved both these idea higher data complexity and also nonlinearity secures the circuit against modeling attacks.The final lower make it suitable for lightweight generators.
In this paper, an efficient method for high speed hardware implementation of AES algorithm is presented. So far, many implementations have been proposed, various goals that effect the SubByte transformation in ways. These methods are based on combinational logic and done polynomial bases. proposed architecture, it by using composite field arithmetic normal addition, key expansion architecture suitable 6 subpipelined round units also By non-feedback mode, a fully encryptor with substages each...
Vehicular Ad Hoc Network (VANET) is an emerging field of wireless networks that facilitates different applications such traffic information for participant vehicles and related authorities. However, deploying mainly depending on the market penetration rate this technology. In paper, we propose a new 3-steps approach estimation volume in road segment based actual wireless-equipped vehicles. For propose, fist collect groups using clustering algorithm. Then, chaining technique between clusters...
Abstract The increase of the capacity processing units and growth distributed computing make easy to collect process information Internet traffic flows. This information, however, can be used perform attacks in anonymous communications that could compromise privacy. With aim preventing these attacks, we propose a scheme implements multimodal behavior using random walk theory crypto‐types. mechanism is responsible for generating network patterns, cryptotype performs micro‐encryption tasks...