Intruders with Caps

نویسندگان

  • Siva Anantharaman
  • Paliath Narendran
  • Michaël Rusinowitch
چکیده

In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a sequence of elements of this set, a cap formed of symbols legally part of his/her knowledge. In this paper, we give sufficient conditions on the rewrite system modeling the intruder’s abilities, such as using encryption and decryption functions, to ensure that it is decidable if such caps exist. The following classes of intruder systems are studied: linear, dwindling, ∆-strong, and optimally reducing; and depending on the class considered, the cap problem (“find a cap for a given set of terms”) is shown respectively to be in P, NP-complete, decidable, and undecidable.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measurements of output factors using different ionization chambers and build up caps

Background: The aim of this work was to study the output factors for Linac using different ionization chambers and build up caps. Materials and Methods: Output factors were measured for open square fields (3 × 3 cm to 40 × 40 cm) defined by collimator jaws for 6 and 15 MV photon beams from a Varian Clinac 2100C accelerator were measured. The measurements in air were performed using Com...

متن کامل

هنجاریابی مقیاس اجرایی بالینی اختلال استرس پس از ضربه (CAPS-1) برای عوارض روانی ناشی از جنگ

Objectives: This study was carried out with the aim of normalizing Clinician Administered PTSD Scale-version 1 (CAPS-1) for psychological consequences due to war. Method: Participants comprised 105 Iran-Iraq war male veterans with a disability degree of 15-50 percent all diagnosed with Posttraumatic Stress Disorder (PTSD). Reliability was evaluated by test-retest with two weeks interval and Cro...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Sociological Explanation of Street Sextual Harassment through Intruders’ Approach: Case Study of 18 – 30 years old males in Sanandaj City

One of the major gaps in research on the subject of sexual harassment is that there is very little information about the characteristics of sexual intruders. Sexual harassment is a conceptualized form of harassment based on gender, which has significant effects on victims. Women constitute about half of the population and face significant stress and sexual harassment on a daily basis in their l...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007