Keywords: تجزیه و تحلیل امنیتی; False data injection attacks; State estimation; Security analysis; Networked control systems;
مقالات ISI تجزیه و تحلیل امنیتی (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: تجزیه و تحلیل امنیتی; Chaotic map; Hash algorithm; Permutation and diffusion; Security analysis; Image encryption;
Keywords: تجزیه و تحلیل امنیتی; Selective permutation; Feedback-based diffusion mechanism; Chaos; Improved architecture; Security analysis;
Keywords: تجزیه و تحلیل امنیتی; Biometrics; Bio-cryptography; Cancelable biometrics; Fingerprints; Key agreement; Security analysis;
Keywords: تجزیه و تحلیل امنیتی; Emerging networking technology; Moving target defense; Security analysis; Security metric; Security model;
Keywords: تجزیه و تحلیل امنیتی; Attack graphs; Internet of things; Security analysis; Security modeling;
Keywords: تجزیه و تحلیل امنیتی; Attack graphs; Attack trees; Security analysis; Security metrics; Security models;
Keywords: تجزیه و تحلیل امنیتی; Image encryption; Orthogonal transforms; Security analysis; JPEG standard;
Keywords: تجزیه و تحلیل امنیتی; Cryptography; Image cryptosystem; Chaotic Baker map; FrFT; Security analysis
Keywords: تجزیه و تحلیل امنیتی; Attack graphs; Attack trees; Complexity analysis; Scalability; Security analysis; Security model;
Keywords: تجزیه و تحلیل امنیتی; Image encryption; Chaos; Low entropy; Security analysis;
Keywords: تجزیه و تحلیل امنیتی; Chaos-based cryptosystem; New formulation of the 2D-cat map; Binary diffusion matrix; Security analysis
Keywords: تجزیه و تحلیل امنیتی; Near field communication; Probabilistic model checking; Relay attack; Security analysis; Wireless communication
Keywords: تجزیه و تحلیل امنیتی; Chaos-based cryptography; Image encryption; Security analysis; Inter–intra pixels bit-level permutation
Keywords: تجزیه و تحلیل امنیتی; Structured argumentation; Risk assessment; Security analysis
Keywords: تجزیه و تحلیل امنیتی; Cryptography; Digital signature; Proxy signature; RSA cryptosystem; Security analysis;
Keywords: تجزیه و تحلیل امنیتی; Cryptography; Identity-based signature; Strongly unforgeability; Security analysis; Bilinear map
Keywords: تجزیه و تحلیل امنیتی; Type-based program analysis; Security analysis; Error feedback
Keywords: تجزیه و تحلیل امنیتی; Wireless sensor network; Key management protocol; Security analysis; Process calculus
Keywords: تجزیه و تحلیل امنیتی; Fully Homomorphic Encryption scheme; MORE; Dynamic diffusion and permutation primitives; Security analysis;
Keywords: تجزیه و تحلیل امنیتی; Anonymity protocols; Information theory; Information leakage; Security analysis
A color image cryptosystem based on dynamic DNA encryption and chaos
Keywords: تجزیه و تحلیل امنیتی; Color image encryption; Chaos; DNA encoding; Security analysis;
Practical security analysis of continuous-variable quantum key distribution with jitter in clock synchronization
Keywords: تجزیه و تحلیل امنیتی; CV-QKD; Security analysis; Clock synchronization; Jitter;
Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks
Keywords: تجزیه و تحلیل امنیتی; FPMIPv6; CGA; BAN-logic; Security analysis; ESS-FH;
Security analysis of a novel fusion encryption algorithm based on dna sequence operation and hyper-chaotic system
Keywords: تجزیه و تحلیل امنیتی; Security analysis; Image encryption; Known-plaintext attack; Hyper-chaotic; DNA sequence;
Security pitfalls of “ePASS: An expressive attribute-based signature scheme”
Keywords: تجزیه و تحلیل امنیتی; Internet of Things; Attribute-based signature; Privacy; Security analysis;
Enhancement of DRPE performance with a novel scheme based on new RAC: Principle, security analysis and FPGA implementation
Keywords: تجزیه و تحلیل امنیتی; Double random phase encryption (DRPE); Binary arithmetic coding (BAC); Randomized arithmetic coding (RAC); Security analysis;
A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps
Keywords: تجزیه و تحلیل امنیتی; Color image encryption; Improved 1D chaotic system; DNA coding; Security analysis; Robustness;
On the security of symmetric ciphers based on DNA coding
Keywords: تجزیه و تحلیل امنیتی; DNA coding; Security analysis; Stream ciphers; Chaos
A new 1D chaotic system for image encryption
Keywords: تجزیه و تحلیل امنیتی; Chaotic system; Image encryption; Security analysis; Chosen-plaintext attack;
Image encryption using binary bitplane
Keywords: تجزیه و تحلیل امنیتی; Bitplane decomposition; Image encryption; Bit-level permutation; Security analysis
A new color image cryptosystem via hyperchaos synchronization
Keywords: تجزیه و تحلیل امنیتی; Color image cryptosystem; Six-dimensional hyperchaotic system; Synchronization; Substitution; Permutation; Security analysis; Attack
Security analysis of temporal RBAC under an administrative model
Keywords: تجزیه و تحلیل امنیتی; Temporal RBAC; Administrative model; AMTRAC; Security analysis; Alloy analyzer
Security analysis of the “Ping-Pong” quantum communication protocol in the presence of collective-rotation noise
Keywords: تجزیه و تحلیل امنیتی; “Ping-Pong” protocol; Collective-rotation noise; The noise level; Qubit error rate; Security analysis;
Optical image encryption based on multiple-region plaintext and phase retrieval in three-dimensional space
Keywords: تجزیه و تحلیل امنیتی; Optical image encryption; Image decryption; Multiple-region plaintext; 3D phase retrieval; Security analysis
On the design of partial encryption scheme for multimedia content
Keywords: تجزیه و تحلیل امنیتی; Multimedia content encryption; Partial encryption; Security analysis; DRM
Image encryption using a new parametric switching chaotic system
Keywords: تجزیه و تحلیل امنیتی; Parametric switching chaotic system; Image encryption; Security analysis
Structured-illumination-based lensless diffractive imaging and its application to optical image encryption
Keywords: تجزیه و تحلیل امنیتی; Lensless diffractive imaging; Structured illumination; Optical image encryption; Security analysis; Virtual optics
Algebraic-graph method for identification of islanding in power system grids
Keywords: تجزیه و تحلیل امنیتی; Electric power systems; Security analysis; Island formation; Graph theory; Incidence matrices applications
Analysis of the security of VPN configurations in industrial control environments
Keywords: تجزیه و تحلیل امنیتی; Control systems; Virtual private networks; Security analysis; Simulation
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN
Keywords: تجزیه و تحلیل امنیتی; Public key algorithm; Chaos; Period distribution; Security analysis; Periodic orbit; Dynamical system
Security analysis of the ADS-B implementation in the next generation air transportation system
Keywords: تجزیه و تحلیل امنیتی; Air transportation system; ADS-B; Security analysis; Attack taxonomy
Security analysis of wireless mesh backhauls for mobile networks
Keywords: تجزیه و تحلیل امنیتی; Security analysis; Wireless mesh backhauls; Mobile networks
Formal description of the SWIFT identity management framework
Keywords: تجزیه و تحلیل امنیتی; Identity aggregation; Security analysis; Cross-layer; Authentication; Authorization
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca
Keywords: تجزیه و تحلیل امنیتی; Security analysis; Vulnerability analysis; Actor; Model checking; Rebeca language
A chaotic block cipher algorithm for image cryptosystems
Keywords: تجزیه و تحلیل امنیتی; Image cryptosystems; Block cipher; Chaos; Primitive operations; Security analysis
Analysis of security threats to MPLS virtual private networks
Keywords: تجزیه و تحلیل امنیتی; Multiprotocol label switching; Virtual private networks; Security analysis
XRound: A reversible template language and its application in model-based security analysis
Keywords: تجزیه و تحلیل امنیتی; Model-Driven Development; Template processing; UML; Security analysis
An aspect-oriented methodology for designing secure applications
Keywords: تجزیه و تحلیل امنیتی; Alloy; Aspect-oriented modeling; Authentication; Secure systems design; Security analysis; UML
Quantum bit string commitment protocol using polarization of mesoscopic coherent states
Keywords: تجزیه و تحلیل امنیتی; 03.67.DdQuantum protocols; Mesoscopic coherent states; Security analysis