نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

2013
Thomas Beyhl Regina Hebig Holger Giese

In MDE diverse modeling and model transformation languages are applied to describe and derive the envisioned system. Traceability is a prerequisite for maintaining consistency between different development artifacts. Thereby, the usefulness of traceability links increases with their completeness and correctness. In practice, automatic creation and maintenance of traceability links is required t...

2015
Wanjie Liang Jing Cao Yan Fan Kefeng Zhu Qiwei Dai Peter J. Hansen

In recent years, traceability systems have been developed as effective tools for improving the transparency of supply chains, thereby guaranteeing the quality and safety of food products. In this study, we proposed a cattle/beef supply chain traceability model and a traceability system based on radio frequency identification (RFID) technology and the EPCglobal network. First of all, the transfo...

2014
Gilbert Regan Miklós Biró Fergal McCaffery Kevin McDaid Derek Flood

Traceability of requirements through the software development lifecycle (including supporting processes such as risk management and change management) is a difficult and expensive task. The implementation of effective traceability allows organizations to leverage its many advantages, such as impact analysis, product verification and validation, and facilitation of code maintenance. Traceability...

Journal: :Int. J. Communication Systems 2014
Chunguang Ma Ding Wang Sendong Zhao

Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In this paper, we analyze two recent proposals in the area of password-based remote user authentication using smart cards. First, we point out that the scheme of Chen et al. cannot achieve all the claimed security goals and report its following flaws: (i) it is...

Journal: :IACR Cryptology ePrint Archive 2001
Alice Silverberg Jessica Staddon Judy L. Walker

We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently tracing traitors. Much work has focused on methods for constructing such traceability schemes, but the complexity of the traitor tracing algorithms has received little attention. A widely used traitor tracing algorithm, the TA algorithm, has a runtime of O(N) in genera...

2014
Birgit Grammel

Traceability data provides the knowledge on dependencies and logical relations existing amongst artefacts that are created during software development. In reasoning over traceability data, conclusions can be drawn to increase the quality of software. The paradigm of Model-driven Software Engineering (MDSD) promotes the generation of software out of models. The latter are specified through diffe...

Journal: :Applied Mathematics and Computation 2005
Sung-Woon Lee Hyun-Sung Kim Kee-Young Yoo

Recently Lee et al. proposed an efficient verifier-based key agreement protocol for three parties without server’s public key. Lee et al. claimed the proposed protocol could resist various attacks and provide the perfect forward secrecy. However, in this paper, authors shall show that their protocol suffers from the impersonation attack. At the same time, authors shall propose an improved metho...

Journal: :CoRR 2016
Yujie Gu Ying Miao

The Stinson-Wei traceability scheme (known as traceability scheme) was proposed for broadcast encryption as a generalization of the Chor-Fiat-Naor traceability scheme (known as traceability code). Cover-free family was introduced by Kautz and Singleton in the context of binary superimposed code. In this paper, we find a new relationship between a traceability scheme and a cover-free family, whi...

2001
Virve Leino Reijo Sulonen

The literature lists many benefits of requirements traceability and standards suggest that it should be practiced. However, available literature concentrates on industries developing complex and large systems with several thousands of requirements. Thus, the companies developing systems with only approximately a hundred requirements face the challenge to define what traceability information to ...

2016
Xiuqing Chen Qiang Zhao Tianjie Cao Jingxuan Zhai

The widespread use of Radio Frequency Identification (RFID) technologies help to trace a large number of commodity and share the tag information in the supply chain system. However, many ownership transfer protocols are subject to various attacks. We analyze the security of two protocols. Even if the designers claim that their protocols are security, we find that their schemes suffer from forwa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید