Search results for: E. Khorram
4 Finding an Optimized Discriminate Function for Internet Application Recognition
Authors: E. Khorram, S.M. Mirzababaei
Abstract:
Everyday the usages of the Internet increase and simply a world of the data become accessible. Network providers do not want to let the provided services to be used in harmful or terrorist affairs, so they used a variety of methods to protect the special regions from the harmful data. One of the most important methods is supposed to be the firewall. Firewall stops the transfer of such packets through several ways, but in some cases they do not use firewall because of its blind packet stopping, high process power needed and expensive prices. Here we have proposed a method to find a discriminate function to distinguish between usual packets and harmful ones by the statistical processing on the network router logs. So an administrator can alarm to the user. This method is very fast and can be used simply in adjacent with the Internet routers.
Keywords: Data Mining, Firewall, Optimization, Packetclassification, Statistical Pattern Recognition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14073 Performance Analysis of Certificateless Signature for IKE Authentication
Authors: Nazrul M. Ahmad, Asrul H. Yaacob, Ridza Fauzi, Alireza Khorram
Abstract:
Elliptic curve-based certificateless signature is slowly gaining attention due to its ability to retain the efficiency of identity-based signature to eliminate the need of certificate management while it does not suffer from inherent private key escrow problem. Generally, cryptosystem based on elliptic curve offers equivalent security strength at smaller key sizes compared to conventional cryptosystem such as RSA which results in faster computations and efficient use of computing power, bandwidth, and storage. This paper proposes to implement certificateless signature based on bilinear pairing to structure the framework of IKE authentication. In this paper, we perform a comparative analysis of certificateless signature scheme with a well-known RSA scheme and also present the experimental results in the context of signing and verification execution times. By generalizing our observations, we discuss the different trade-offs involved in implementing IKE authentication by using certificateless signature.Keywords: Certificateless signature, IPSec, RSA signature, IKE authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17992 The Law of Treaties and National Security of Islamic Republic of Iran
Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad
Abstract:
The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.
Keywords: Treaties, national security, Iran, Islamic Revolution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14391 The Buffer Gas Influence Rate on Absolute Cu Atoms Density with regard to Deposition
Authors: S. Sobhanian, H. Naghshara, N. Sadeghi, S. Khorram
Abstract:
The absolute Cu atoms density in Cu(2S1/2ÔåÉ2P1/2) ground state has been measured by Resonance Optical Absorption (ROA) technique in a DC magnetron sputtering deposition with argon. We measured these densities under variety of operation conditions: pressure from 0.6 μbar to 14 μbar, input power from 10W to 200W and N2 mixture from 0% to 100%. For measuring the gas temperature, we used the simulation of N2 rotational spectra with a special computer code. The absolute number density of Cu atoms decreases with increasing the N2 percentage of buffer gas at any conditions of this work. But the deposition rate, is not decreased with the same manner. The deposition rate variation is very small and in the limit of quartz balance measuring equipment accuracy. So we conclude that decrease in the absolute number density of Cu atoms in magnetron plasma has not a big effect on deposition rate, because the diffusion of Cu atoms to the chamber volume and deviation of Cu atoms from direct path (towards the substrate) decreases with increasing of N2 percentage of buffer gas. This is because of the lower mass of N2 atoms compared to the argon ones.Keywords: Deposition rate, Resonance Optical Absorption, Sputtering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1366