نتایج جستجو برای: the man
تعداد نتایج: 16069788 فیلتر نتایج به سال:
We study Input Indistinguishable Computation (IIC), a security notion proposed by Micali, Pass, and Rosen in [14] and recently considered also by Garg, Goyal, Jain and Sahai in [9]. IIC aims at generalizing the notion of a Witness Indistinguishable (WI) proof system to general two-party functionalities and in its concurrent version (cIIC) also considers security against man-in-the-middle (MiM) ...
This paper presents a critical analysis of the AACS drive-host authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. In particular, we observe that the scheme is susceptible to unknown key-share and man-in-the-middle attacks. Modifications of the scheme are suggested in order to provide better security. A proof of security of the modified sche...
It is well-known that protocols that satisfy a security property when executed in isolation do not necessarily satisfy the same security property when they are executed in an environment containing other protocols. We demonstrate this fact on a family of recently proposed RFID protocols by Lee, Batina, and Verbauwhede. We invalidate the authentication and untraceability claims made for several ...
This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak’s three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak’s threestage protocol is provided that makes it possible to deal with man-in-the-middle attack.
This paper introduces a variation on Kak’s three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.
Demographic Studies, Duke University. An early version of this paper was presented at the Nobel Symposium in Economics, December 5-7, Lund, Sweden, 1991. I wish to acknowledge comments on this earlier draft by Nancy Birdsall, John Bongaarts, Martin Bronfenbrenner, A. W. Coats, Ansley J. Coale, Peter J. Donaldson, Richard A. Easterlin, Dennis Hodgson, Nathan Keyfitz, Geoffrey McNicoll, Thomas W....
Pauline Verlhac 1,2,3,4,5 , Christophe Viret 1,2,3,4,5 and Mathias Faure 1,2,3,4,5, * 1 CIRI, International Center for Infectiology Research, Université de Lyon, 69007 Lyon, France. 2 Inserm, U1111, 69007 Lyon, France. 3 CNRS, UMR5308, 69007 Lyon, France. 4 Ecole Normale Supérieure de Lyon, 69007 Lyon, France. 5 Université Lyon 1, Centre International de Recherche en Infectiologie, 69007 Lyon, ...
Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge when systems are deployed, even with the use of state-of-the-art security protocols. Our findings suggest that wide-spread security problems exist even when protocols such as SSL and SSH are deployed because systems today do no...
We construct a simple authentication protocol whose security is based solely on the problem of Learning Parity with Noise (LPN) that is secure against Man-in-the-Middle attacks. Our protocol is suitable for RFID devices, whose limited circuit size and power constraints rule out the use of more heavyweight operations such as modular exponentiation. The protocol is extremely simple: both parties ...
abstract this study aimed at investigating the possible relationship between self-assessment in writing and self-regulation of iranian efl learners. the main purpose of the study was not only to report and inform about this relationship, but also to investigate and find practical outcomes of the incorporation of self-assessment in writing, such as improving writing skill. the research was carr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید