Loading...
Search for:
attari--m
0.138 seconds
Total 19348 records
Hydrothermal synthesis of TiO2 nanorod for using as an electron transport material in perovskite solar cells
, Article 6th International Biennial Conference on UltraFine Grained and Nanostructured Materials, UFGNSM 2017, 12 November 2017 through 13 November 2017 ; Volume 1920 , 2018 ; 0094243X (ISSN); 9780735416123 (ISBN) ; Nemati, A ; Attari Navab, A ; Abad, H. M. M ; Sharif University of Technology
American Institute of Physics Inc
2018
Abstract
Now days titanium dioxide is used in different applications because of its good electrical properties, optical stability and cost savings. According to their different nanoscale TiO2 structures, it has been determined that 1D structures such as nanorods, nanotubes and nanowires has better properties than the other structures, including enhancing electron transport and create an offered directional way of transporting of the electrons. However, the grain boundaries in polycrystalline TiO2 nanowires or nanotubes cause electron scattering or trapping, which limit their application in optoelectronics. From these TiO2 structures, TiO2 nanorods have special importance because of less defects...
Embedded SI partial transmit sequence with improved bit error rate
, Article 2nd International Conference on Electrical Engineering, ICEE, Lahore, 25 March 2008 through 26 March 2008 ; 2008 ; 9781424422937 (ISBN) ; Ahmadian Attari, M ; Reisi, N
2008
Abstract
OFDM is a multicarrier modulation scheme with high bandwidth efficiency and robustness to multipath environment used in high data rate transmission. However, a drawback of this system is the large Peak-to-Average-Power Ratio (PAR) of the transmit signal which makes its straightforward implementation quite costly. PAR in an OFDM based system can be reduced significantly by PTS method for which data recovery requires side information (SI) about the phases used at transmitter. Sending SI, not only reduces the rate, but also increases BER, for any error in SI detection can damage a large amount of transmitted information. By introducing a new phase set, we propose a PTS based method for MPSK...
Analysis of a fractional order Van der Pol-like oscillator via describing function method
, Article Nonlinear Dynamics ; Volume 61, Issue 1-2 , 2010 , Pages 265-274 ; 0924090X (ISSN) ; Haeri, M ; Tavazoei, M. S ; Sharif University of Technology
2010
Abstract
In this paper, the behavior of a fractional order Van der Pol-like oscillator is investigated using a describing function method. A parametric function for the boundary between oscillatory and nonoscillatory regions of this system is extracted. The analytical results are evaluated by numerical simulations which demonstrate sufficient reliability of the proposed analyzing method
Cooperative relay cognitive interference channel
, Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 1064-1069 ; 9781424469406 (ISBN) ; Aref, M. R ; Ahmadian Attari, M ; Sharif University of Technology
2010
Abstract
The cooperative relay cognitive interference channel (RCIC) is a four-node network with two source nodes (primary source and cognitive source) and two destination nodes, in which sources try to communicate at certain rates with their corresponding destinations simultaneously through a common medium and each destination can act as a relay to assist the other one. For the partially cooperative RCIC (PC-RCIC), in which only one of the destinations (corresponding to the cognitive source) acts as a relay, we derive an achievable rate region based on using rate splitting and superposition coding at the cognitive source, and using decode-and-forward scheme at the relay. For the degraded PC-RCIC, we...
More details on analysis of fractional-order Van der Pol oscillator
, Article JVC/Journal of Vibration and Control ; Volume 15, Issue 6 , 2009 , Pages 803-819 ; 10775463 (ISSN) ; Haeri, M ; Attari, M ; Bolouki, S ; Siami, M ; Sharif University of Technology
2009
Abstract
This paper is devoted to the analysis of fractional order Van der Pol system studied in the literature. Based on the existing theorems on the stability of incommensurate fractional order systems, we determine parametric range for which a fractional order Van der Pol system with a specific order can perform as an undamped oscillator. Numerical simulations are presented to support the given analytical results. These results also illuminate a main difference between oscillations in a fractional order Van der Pol oscillator and its integer order counterpart. We show that contrary to integer order case, trajectories in a fractional Van der Pol oscillator do not converge to a unique cycle. © 2009...
Robust relay beamforming against jamming attack
, Article IEEE Communications Letters ; 2017 ; 10897798 (ISSN) ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
2017
Abstract
In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using Kalman filtering (KF) approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a Quadratically Constrained Quadratic Program (QCQP). Simulation results show efficient performance of the proposed method for different destruction powers of jammer by achieving the Cramer Rao Lower Bound (CRLB). IEEE
Provably secure strong designated verifier signature scheme based on coding theory
, Article International Journal of Communication Systems ; Volume 30, Issue 7 , 2017 ; 10745351 (ISSN) ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
John Wiley and Sons Ltd
2017
Abstract
Strong Designated Verifier Signature (SDVS) provides authentication for the signer and the verifier such that the signer is assured that what s/he has signed, is only verified by the designated verifier. Currently, the security of most of the SDVS schemes is based on hard problems in the number theory. As it is proved that all kinds of cryptosystems which are based on the number theory will not tolerate quantum attacks, here, an SDVS scheme based on hard problems in coding theory is presented. We have proved that the suggested scheme is unforgeable under a chosen message attack in Random Oracle Model. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd
Robust relay beamforming against jamming attack
, Article IEEE Communications Letters ; Volume 22, Issue 2 , February , 2018 , Pages 312-315 ; 10897798 (ISSN) ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2018
Abstract
In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using the Kalman filtering approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a quadratically constrained quadratic program. Simulation results show the efficient performance of the proposed method for different destruction powers of the jammer by achieving the Cramér-Rao lower bound. © 1997-2012 IEEE
Comments on a lightweight cloud auditing scheme: Security analysis and improvement
, Article Journal of Network and Computer Applications ; Volume 139 , 2019 , Pages 49-56 ; 10848045 (ISSN) ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
Academic Press
2019
Abstract
In a cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new lightweight and privacy preserving cloud data auditing scheme which employs a third party medium to perform time-consuming operations on behalf of users. The authors have claimed that the scheme meets the security requirements of public auditing mechanisms. In this paper, we show that Shen et al.'s scheme is insecure by proposing two attacks on the scheme. In the first attack, an outside adversary can modify some messages in transmission to the cloud server...
An identity-based online/offline secure cloud storage auditing scheme
, Article Cluster Computing ; Volume 23, Issue 2 , 2020 , Pages 1455-1468 ; Rajabzadeh Asaar, M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Springer
2020
Abstract
Cloud storage has significantly reduced data management costs for data owners. However, loss of physical control over the data after outsourcing, triggers some security concerns such as data integrity. Provable Data Possession (PDP) protocols, enable data owners to audit the integrity of their outsourced data without the need to retrieve the file from cloud server. However, most existing PDP schemes require resource-constrained users to perform costly operations for generating metadata on file blocks. In online/offline PDP mechanisms introduced most recently, the user’s computation is divided into online/offline phases, where the costly operations are allowed to be carried out in the offline...
An id-based privacy-preserving integrity verification of shared data over untrusted cloud
, Article 25th International Computer Conference, Computer Society of Iran, CSICC 2020, 1 January 2020 through 2 January 2020 ; 2020 ; Sedaghat, S. M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
Data sharing is considered as a favorite service provided by cloud storage servers in which the stored data is shared among a group of users. However, auditing such shared data is a big security issue for cloud users. In this paper, we propose an ID-Based public shared data integrity auditing scheme, in which all the group users are able to update, delete or insert new blocks into the shared data. Besides, the cloud server can revoke a misbehaving user with a minimum overhead. The scheme is secure against an untrusted cloud server and also preserves data privacy against the public verifier. Furthermore, overhead analysis shows the efficiency of proposed scheme in comparison to the existing...
A lightweight identity-based provable data possession supporting users’ identity privacy and traceability
, Article Journal of Information Security and Applications ; Volume 51 , 2020 ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
Cloud storage auditing is considered as a significant service used to verify the integrity of data stored in public cloud. However, most existing auditing protocols suffer form complex certificate management/verification since they rely on expensive Public Key Infrastructure (PKI). On the other hand, most cloud users have constrained computational resources. The few existing ID-based storage auditing protocols in the literature, require resource-constrained users to perform costly operations for generating metadata on file blocks. In this paper, we propose a storage auditing protocol which benefits from ID-based structure and lightweight user computations, simultaneously. Our construction...
On the reliable transmission of correlated sources over two-relay network
, Article 2013 IEEE Information Theory Workshop, ITW 2013 ; 2013 ; 9781479913237 (ISBN) ; Akhbari, B ; Ahmadian-Attari, M ; Aref, M. R ; Sharif University of Technology
2013
Abstract
In this paper, we investigate reliable transmission of three correlated discrete memoryless sources over a two-relay network. In our considered model, one of the sources is available at the sender whereas, the other two sources are known to the first and the second relay. We present both joint and separate source-channel coding schemes, and derive the corresponding sets of sufficient conditions for reliable sources transmission. The manner of cooperation in both schemes is Decode-and-Forward strategy. In the joint approach, we generalize the correlation preserving mapping technique to our model using nested backward decoding. Our proposed separate approach is based on Slepian-Wolf source...
A location privacy-preserving method for spectrum sharing in database-driven cognitive radio networks
, Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 3687-3711 ; 09296212 (ISSN) ; Ahmadian Attari, M ; Jannati, H ; Aref, M. R ; Sharif University of Technology
Springer New York LLC
2017
Abstract
The great attention to cognitive radio networks (CRNs) in recent years, as a revolutionary communication paradigm that aims to solve the problem of spectrum scarcity, prompts serious investigation on security issues of these networks. One important security concern in CRNs is the preservation of users location privacy, which is under the shadow of threat, especially in database-driven CRNs. To this end, in this paper, we propose a Location Privacy Preserving Database-Driven Spectrum-Sharing (L-PDS 2) protocol for sharing the spectrum between PUs and SUs in a database-driven CRN, while protecting location privacy of both primary and secondary users, simultaneously. We also present two...
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network
, Article ISeCure ; Volume 14, Issue 2 , 2022 , Pages 215-227 ; 20082045 (ISSN) ; Ahmadian Attari, M ; Aref, M. R ; Jannati, H ; Sharif University of Technology
Iranian Society of Cryptology
2022
Abstract
Since their introduction, Cognitive Radio Networks (CRN), as a new solution to the problem of spectrum scarcity, have received great attention from the research society. An important field in database-driven CRN studies is pivoted on their security issues. A critical issue in this context is user’s location privacy, which is potentially under serious threat. The query process by secondary users (SU) from the database is one of the points where the problem rises. In this paper, we propose a Privacy-Preserving Query Process (PPQP), accordingly. This method lets SUs deal in the process of spectrum query without sacrificing their location information. Analytical assessment of PPQP’s privacy...
Real-Time cooperative adaptive robust relay beamforming based on kalman filtering channel estimation
, Article IEEE Transactions on Wireless Communications ; Volume 18, Issue 12 , 2019 , Pages 5600-5612 ; 15361276 (ISSN) ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
In this paper, an adaptive channel estimation algorithm is proposed for the multi-user robust relay beamforming problem. We propose a norm-bounded channel uncertainty model for all of the channels. We employ the Extended Kalman Filter (EKF) and the Unscented Kalman Filter (UKF) for joint estimation of channel coefficients and beamforming weights, and propose a Markov model for source-relay and relay-destination channels as well as the beamforming weights in the relays. The channel coefficients and bemforming weights are shown to be well-estimated in order to minimize the total relays power transmission subject to worst-case signal to interference and noise ratio (SINR) criterion at each...
Compound multiple access channel with confidential messages
, Article 2014 IEEE International Conference on Communications, ICC 2014 ; 10-14 June 2014 , 2014 , Pages 1922-1927 ; ISBN: 9781479920037 ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
2014
Abstract
In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate...
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes
, Article IET Information Security ; Volume 10, Issue 4 , 2016 , Pages 194-202 ; 17518709 (ISSN) ; Ahmadian Attari, M ; Johansson, T ; Aref, M. R ; Sharif University of Technology
Institution of Engineering and Technology
2016
Abstract
One of the approaches to modify the McEliece cryptosystem to overcome its large key size is replacing binary Goppa codes with a new structured code. However, this modification makes such cryptosystems encounter some new attacks. There are a few modified McEliece cryptosystem variants which are known to be secure. One of them is the cryptosystem introduced by Baldi et al. which uses quasi-cyclic low-density parity check (QC-LDPC) codes. This cryptosystem is still unbroken as no efficient attack has been reported against it since 2008. In this study, an attack has been applied to this cryptosystem which is feasible when the code length is a multiple of a power of 2. Also an important weakness...
Imperfect and Perfect Secrecy in Compound Multiple Access Channel with Confidential Message
, Article IEEE Transactions on Information Forensics and Security ; Volume 11, Issue 6 , 2016 , Pages 1239-1251 ; 15566013 (ISSN) ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
In this paper, we study the problem of secret communication over a compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential, which is only decoded by its corresponding receiver and kept secret from the other receiver. We call this proposed setting the compound MAC with a confidential message. For this model, we derive general inner and outer bounds for both imperfect and perfect secrecy conditions for the second receiver. Also, as examples, we investigate less noisy and Gaussian versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the...
Multiple access channel with common message and secrecy constraint
, Article IET Communications ; Volume 10, Issue 1 , 2016 , Pages 98-110 ; 17518628 (ISSN) ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Institution of Engineering and Technology
2016
Abstract
The authors study the problem of secret communication over a multiple-access channel with a common message. Here, the authors assume that two transmitters have confidential messages, which must be kept secret from the wiretapper (the second receiver), and both of them have access to a common message which can be decoded by the two receivers. The authors call this setting as multiple-access wiretap channel with common message (MAWC-CM). For this setting, the authors derive general inner and outer bounds on the secrecy capacity region for the discrete memoryless case and show that these bounds meet each other for a special case called the switch channel. As well, for a Gaussian version of...