109 research outputs found
Practical IBC Using Hybrid-Mode Problems: Factoring and Discrete Logarithm
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization problem and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this paper is to design practical IBC using hybrid mode problems factoring and discrete logarithm. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system
Practical IBC using Hybrid-Mode Problems: Factoring and Discrete Logarithm
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization problem and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this paper is to design practical IBC using hybrid mode problems factoring and discrete logarithm. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system
Fuzzy Multi-criteria Decision Making associated with Risk and Confidence Attributes
The multicriteria decision problems involve uncertainty, it is important to incorporate different types of uncertainty in any proposed solution. In this paper, we presented fuzzy MCDM approach based on risk and confidence analysis that we believe is effective in tackling complex, ill-defined and human-oriented decision problems
An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems
The telecare medicine information systems (TMIS) offer a networking channel across public networks to access remote medical services and enable health care professionals and medical staff to make the best clinical decisions and treatments quickly. The verified-based three-party authentication protocol in TMIS for data exchange, authorizations only two patients/users to accumulation their verifiers in the record of authentication server calculated exhausting own password. The authentication scheme will then verify the verifiers of the patients/users and allow them to exchange electronic medical records securely and easily. In this paper, we provide an effective, provably secure, verified-based three-party authentication protocol for data exchange in TMIS utilising fractional chaotic maps. The authentication protocol provided does not use any public server keys and does not require the number of additional messages and rounds for key validation. The projected protocol is appropriate for TMIS because it has stronger security and cheaper communication costs than the corresponding verified-based approach. The development of smart cities can be accelerated with the proposed protocol.Post-print / Final draf
Synthesis, Characterization, and Biological Activity of 4-(2-Hydroxy-5-(aryl-diazenyl)phenyl)-6-(aryl)pyrimidin-2-ols Derivatives
Barriers of managing cloud outsource software development projects: a multivocal study
Management of COSD projects is a challenging task due to number of distant development locations in different time zones, client and vendor organizations, different cloud deployment models and range of different service level agreements. The objective of this study is to identify the barriers associated with managing COSD projects. We implemented a Multivocal Literature Review to identify barriers that influence management of COSD projects. We identified 21 COSD management barriers from 165 primary studies. The comparison between the barriers identified from formal and grey literature indicate that there are similarities between the barriers investigated from both types of literature. Moreover, client-vendor analysis shows that there is no significant difference between COSD management barriers associated with both types of organizations. We believe that the study findings will assist both research and industry community to better understand and manage COSD projects.Post-print / Final draf
Lycopene for Cardiovascular Health: Preclinical to Clinical Evidence
Cardiovascular disorder is a significant source of illness and destruction in the US and worldwide. It is well known that diet and cardiovascular disease (CVD) are related and that managing and preventing CVD begins with dietary changes. The latest epoch of nutritional, medicinal, botanical, physiological, and analytical sciences has emerged due to the finding of bioactive constituents behind the necessary supplements appearing in foods. The main metabolic benefits of lycopene include improving the increase of LDL and VLDL and reducing arterial stiffness. It also has anti-atherosclerotic, antioxidant, anti-hypertensive, and lowers the pro-inflammatory cytokines. One food ingredient that has caught the interest of scientists in food, agriculture, and dietary accessory businesses is lycopene. Lycopene positively impacts health, particularly those connected to its antioxidant properties and ability to prevent cardiovascular disease (CVD). In addition to giving tomatoes and tomato-based products their characteristic red shade, lycopene also has health-beneficial qualities. Several preclinical and clinical studies have proven the value of lycopene in treating cardiovascular disease. 
- …
