An Attack Scheme with a T-DMB TPEG Update based Vulnerability
نویسندگان
چکیده
منابع مشابه
Design and Implementation of Interactive TPEG-UCM Application Service Using T-DMB
In Korea, the T-DMB (terrestrial-digital multimedia broadcasting) commercial service was successfully launched. However, T-DMB service providers are very weak for beneficial business because T-DMB A/V services have been started free of charge. Therefore, they want to have pay services like data services. Among these data services, the TTI (Traffic and Travel Information) service based on TPEG (...
متن کاملAVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis be...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملAn attack on a group-based cryptographic scheme
We give an attack on a public key encryption scheme suggested by Shpilrain and Zapata. Experimental evidence shows that this attack is practical and works for the proposed parameters. We give a way to repair the encryption scheme so that our attack does not work anymore. However, we also expose weak points of the scheme that do not seem to be repairable in an obvious manner.
متن کاملA collusion attack on the fuzzy vault scheme
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Convergence Society
سال: 2014
ISSN: 2233-4890
DOI: 10.15207/jkcs.2014.5.3.001