نتایج جستجو برای: and third party damage index tpdi

تعداد نتایج: 16913533  

2008
Nathan Griffiths Arshad Jhumka Anthony Dawson Richard Myers

In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, the absence of any trusted third party in such networks may result in nodes deviating from the routing protocol for selfish or malicious reasons. The concept of trusted routing has been promoted to handle the problems selfish and mali...

1998
Dogan Kesdogan Peter Reichl Klaus Junghärtchen

One of the major security aspects in mobile communication networks concerns information about the localization of the (mobile) network user. This information may be protected by establishing a trusted third party that is responsible for creating suitable pseudonyms for the user identity. Distributing the maintenance of pseudonyms among n independent trusted parties allows to increase further th...

2002
Dennis Kügler

While anonymous payments are necessary for privacy reasons, they can as well be misused for criminal activities: Anonymous electronic cash can be used to conduct crimes that would be impossible with physical cash. As potential misuse of anonymity cannot be tolerated, the allowed anonymity has to be restricted. Payment systems with restricted anonymity are commonly based on the concept of a trus...

2017
Deepak Kumar Zane Ma Zakir Durumeric Ariana Mirian Joshua Mason J. Alex Halderman Michael Bailey

Over the past 20 years, websites have grown increasingly complex and interconnected. In 2016, only a negligible number of sites are dependency free, and over 90% of sites rely on external content. In this paper, we investigate the current state of web dependencies and explore two security challenges associated with the increasing reliance on external services: (1) the expanded attack surface as...

2005
Guilin Wang Feng Bao Kenji Imamoto Kouichi Sakurai

As a value-added service for standard email systems, a certified email scheme allows a sender to deliver a message to a receiver in a fair way in the sense that either the sender obtains a receipt from the receiver and the receiver accesses the content of the email simultaneously, or neither party gets the expected item. In this paper, we first point out some weaknesses in several existing sche...

Journal: :IEEE Transactions on Mobile Computing 2019

Self-defence is everyone’s right. Based on this right, one can defend himself against any eminent threat, even if it cause the predator’s death. This ethical principle is an applicable principle in ethics in war. However, the principle of self-defence has been applied in other situation such as justification of abortion if mother’s life is threatened by her fetus. Judith Thompson is a philosoph...

Journal: :CoRR 2017
Xavier Carpent Norrathep Rattanavipanon Gene Tsudik

Remote attestation (RA) is a popular means of detecting malware in embedded and IoT devices. RA is usually realized as an interactive protocol, whereby a trusted party – verifier – measures integrity of a potentially compromised remote device – prover. Early work focused on purely softwarebased and fully hardware-based techniques, neither of which is ideal for low-end devices. More recent resul...

2001
Agathe Merceron

The actual trend in the transport industry is to have electronic systems without mechanical back-up, so-called ”bywire” systems. Micro-computers control steering, brakes, power train etc... Robust protocols are needed to make these micro-computers communicate. They should be faulttolerant and yet not let the micro-computers split into disjoint communicating subsets. TTP is a time-triggered prot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید