نتایج جستجو برای: passive key generation center attack
تعداد نتایج: 1271168 فیلتر نتایج به سال:
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In th...
-The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering t...
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming...
Abstract: We present a comprehensive analysis of the Johnson (like) noise based classical key-distribution scheme presented by Kish [1]. We suggest two passive attack strategies that enable an adversary to gain complete knowledge of the exchanged key. The first approach exploits the transient response of the voltage in the transmission line after the resistors are switched and the second one ex...
This paper proposes an identity-based threshold key escrow scheme. The scheme is secure against identity-based threshold chosen-plaintext attack. It tolerates the passive adversary to access data of corrupted key escrow agency servers and the active adversary that can modify corrupted servers’ keys. The formal proof of security is presented in the random oracle model, assuming the Bilinear Diff...
We present and analyse a secure protocol for group management, in large and dynamic ad hoc networks. The protocol we suggest relies on the TGDH protocol. In comparison with the previous solution, our algorithm helps to uniformly dispatch the group key calculus on each node, and the global cryptographic tree is optimized. Moreover, we propose an authentication algorithm. Our algorithm provides s...
With the many advantages of web-based mail comes a very serious privacy flaw – all messages are stored in a single central location on the webmail operator’s data center. This fact makes these data centers a natural interception point for various undesirable parties, severely risking the privacy of individual webmail users. We propose a novel and unique way to solve this problem and protect the...
The physical-layer key generation is a lightweight technique to generate secret keys from wireless channels for resource-constrained Internet of things (IoT) applications. security relies on spatial decorrelation, which assumes that eavesdroppers observe uncorrelated channel measurements when they are located over half-wavelength away legitimate users. Unfortunately, there no experimental valid...
The idea of passive euthanasia has recently been attacked in a particularly clear and explicit way by an ‘‘Ethics Task Force’’ established by the European Association of Palliative Care (EAPC) in February 2001. It claims that the expression ‘‘passive euthanasia’’ is a contradiction in terms and hence that there can be no such thing. This paper critically assesses the main arguments for the Task...
The elliptic curve digital signature algorithm (ECDSA) is used in many devices to provide authentication. In the last few years, more and more ECDSA implementations have been proposed that allow the integration into resource-constrained devices like RFID tags. Their resistance against power-analysis attacks has not been scrutinized so far. In this article, we provide first results of power-anal...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید