نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

2001
Hirofumi Muratani

A c-secure code with -error is one of the fingerprinting codes robust against a collusion attack. The purpose of this study is to construct a new c-secure code which has a shorter code length for a largescale collusion than ever proposed. We call this code a c-secure CRT code. Furthermore, we investigate possible approaches to make this code robust against random-error addition. Two approaches ...

Journal: :Security and Communication Networks 2015
Mohsen Toorani

This paper considers security analysis of a cross-realm client-to-client password-authenticated key exchange (C2C-PAKE) protocol with indirect communication structure that was proposed for secure email. The protocol does not need any public key infrastructure (PKI) and was designed to enable senders and recipients of emails to register at different mail servers. However, mail servers require sh...

2006
Stephan Bohacek

An optimal approach to mitigation of flooding denial of service attacks is presented. The objective is to minimize effect of the mitigation while protecting the server. The approach relies on routers filtering enough packets so that the server is not overwhelmed while ensuring that as little filtering is performed as possible. The optimal solution is to filter packets at routers through which t...

2017
Gilberto A. Cysneiros Filho Andrea Zisman

Software traceability is the ability to relate artefacts created during the life cycle of software development. Traceability is fundamental to support several activities of the software development process such as impact analysis, software maintenance and evolution, verification and validation. Despite the importance and advances in the software traceability area, traceability practice is still...

2003
George Spanoudakis Artur S. d'Avila Garcez Andrea Zisman

In this paper we present a machine learning approach for generating requirements traceability relations. This approach is based on a new learning algorithm that produces traceability rules which are able to capture traceability relations between requirement statements specified in natural language and object models. The creation of these traceability rules is informed by examples of traceabilit...

Journal: :Internet policy review 2022

This glossary entry explores traceability which is an increasingly prominent research topic in decentralised technosocial systems fields as diverse health, sustainability, finance, and supply chain management relates to the ability trace something or someone.

2017
P. Gokulakrishnan

Telecare Medicine Information System (TMIS) is an effective technology in which patients can remain at their home and can get suggestions for medical treatment through the internet. One of the challenges faced by this system is security of medical data. Hence mutual authentication and session key establishment on a medical server between doctor and a patient are required for enhancing security ...

Journal: :IJAL 2012
Yun Liu Peiji Shao

This paper discusses how to use the RFID technology to realize the life-time traceability of animals. In order to record movements of an animal, the authors adapt the electronic pedigree designed for drugs to animals, which acts as standard data elements and is transferred between partners. Then a CIS is proposed based on the methodology which ensures movements of the animal to be recorded corr...

Journal: :J. Computational Applied Mathematics 2014
Masoumeh Safkhani Pedro Peris-Lopez Julio César Hernández Castro Nasour Bagheri

Radio frequency identification systems need secure protocols to provide confidentiality, privacy protection, mutual authentication, etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and de-synchronization attacks. Cho et al. recently proposed a hash-basedmutual authentication protocol (Cho et al., 2012) and claimed that their scheme addresses al...

2016
Gennian Ge Chong Shangguan

Traceability codes are combinatorial objects introduced by Chor, Fiat and Naor in 1994 to be used to trace the origin of digital content in traitor tracing schemes. Let F be an alphabet set of size q and n be a positive integer. A t-traceability code is a code C ⊆ Fn which can be used to catch at least one colluder from a collusion of at most t traitors. It has been shown that t-traceability co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید