نتایج جستجو برای: passive key generation center attack

تعداد نتایج: 1271168  

2015
Namje Park Namhi Kang

The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In th...

2016
S. Rajeswari R. Maheswari

-The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering t...

Journal: :Informatica, Lith. Acad. Sci. 2006
Yu Long Kefei Chen Shengli Liu

This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming...

2006
Jacob Scheuer Amnon Yariv

Abstract: We present a comprehensive analysis of the Johnson (like) noise based classical key-distribution scheme presented by Kish [1]. We suggest two passive attack strategies that enable an adversary to gain complete knowledge of the exchanged key. The first approach exploits the transient response of the voltage in the transmission line after the resistors are switched and the second one ex...

Journal: :I. J. Network Security 2009
Yu Long Zheng Gong Kefei Chen Shengli Liu

This paper proposes an identity-based threshold key escrow scheme. The scheme is secure against identity-based threshold chosen-plaintext attack. It tolerates the passive adversary to access data of corrupted key escrow agency servers and the active adversary that can modify corrupted servers’ keys. The formal proof of security is presented in the random oracle model, assuming the Bilinear Diff...

2007
Frederic Cuppens Nora Cuppens

We present and analyse a secure protocol for group management, in large and dynamic ad hoc networks. The protocol we suggest relies on the TGDH protocol. In comparison with the previous solution, our algorithm helps to uniformly dispatch the group key calculus on each node, and the global cryptographic tree is optimized. Moreover, we propose an authentication algorithm. Our algorithm provides s...

2009
Yossef Oren

With the many advantages of web-based mail comes a very serious privacy flaw – all messages are stored in a single central location on the webmail operator’s data center. This fact makes these data centers a natural interception point for various undesirable parties, severely risking the privacy of individual webmail users. We propose a novel and unique way to solve this problem and protect the...

Journal: :Computer Communications 2022

The physical-layer key generation is a lightweight technique to generate secret keys from wireless channels for resource-constrained Internet of things (IoT) applications. security relies on spatial decorrelation, which assumes that eavesdroppers observe uncorrelated channel measurements when they are located over half-wavelength away legitimate users. Unfortunately, there no experimental valid...

2005
E Garrard S Wilkinson

The idea of passive euthanasia has recently been attacked in a particularly clear and explicit way by an ‘‘Ethics Task Force’’ established by the European Association of Palliative Care (EAPC) in February 2001. It claims that the expression ‘‘passive euthanasia’’ is a contradiction in terms and hence that there can be no such thing. This paper critically assesses the main arguments for the Task...

2009
Michael Hutter Marcel Medwed Daniel M. Hein Johannes Wolkerstorfer

The elliptic curve digital signature algorithm (ECDSA) is used in many devices to provide authentication. In the last few years, more and more ECDSA implementations have been proposed that allow the integration into resource-constrained devices like RFID tags. Their resistance against power-analysis attacks has not been scrutinized so far. In this article, we provide first results of power-anal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید