نتایج جستجو برای: the man

تعداد نتایج: 16069788  

2014
Rafail Ostrovsky Giuseppe Persiano Ivan Visconti

We study Input Indistinguishable Computation (IIC), a security notion proposed by Micali, Pass, and Rosen in [14] and recently considered also by Garg, Goyal, Jain and Sahai in [9]. IIC aims at generalizing the notion of a Witness Indistinguishable (WI) proof system to general two-party functionalities and in its concurrent version (cIIC) also considers security against man-in-the-middle (MiM) ...

Journal: :IACR Cryptology ePrint Archive 2007
Jiayuan Sui Douglas R. Stinson

This paper presents a critical analysis of the AACS drive-host authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. In particular, we observe that the scheme is susceptible to unknown key-share and man-in-the-middle attacks. Modifications of the scheme are suggested in order to provide better security. A proof of security of the modified sche...

Journal: :IACR Cryptology ePrint Archive 2009
Ton van Deursen Sasa Radomirovic

It is well-known that protocols that satisfy a security property when executed in isolation do not necessarily satisfy the same security property when they are executed in an environment containing other protocols. We demonstrate this fact on a family of recently proposed RFID protocols by Lee, Batina, and Verbauwhede. We invalidate the authentication and untraceability claims made for several ...

Journal: :CoRR 2007
Partha Basuchowdhuri

This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak’s three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak’s threestage protocol is provided that makes it possible to deal with man-in-the-middle attack.

Journal: :CoRR 2007
James Harold Thomas

This paper introduces a variation on Kak’s three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.

1999
Martin Bronfenbrenner A. W. Coats Ansley J. Coale Peter J. Donaldson Richard A. Easterlin Dennis Hodgson Nathan Keyfitz Geoffrey McNicoll Thomas W. Merrick Samuel Preston Mark Perlman Julian L. Simon Steven Sinding Gunter Steinman Jeffrey G. Williamson Allen C. Kelley

Demographic Studies, Duke University. An early version of this paper was presented at the Nobel Symposium in Economics, December 5-7, Lund, Sweden, 1991. I wish to acknowledge comments on this earlier draft by Nancy Birdsall, John Bongaarts, Martin Bronfenbrenner, A. W. Coats, Ansley J. Coale, Peter J. Donaldson, Richard A. Easterlin, Dennis Hodgson, Nathan Keyfitz, Geoffrey McNicoll, Thomas W....

2015
Pauline Verlhac Christophe Viret Mathias Faure

Pauline Verlhac 1,2,3,4,5 , Christophe Viret 1,2,3,4,5 and Mathias Faure 1,2,3,4,5, * 1 CIRI, International Center for Infectiology Research, Université de Lyon, 69007 Lyon, France. 2 Inserm, U1111, 69007 Lyon, France. 3 CNRS, UMR5308, 69007 Lyon, France. 4 Ecole Normale Supérieure de Lyon, 69007 Lyon, France. 5 Université Lyon 1, Centre International de Recherche en Infectiologie, 69007 Lyon, ...

2007
Atul Prakash

Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge when systems are deployed, even with the use of state-of-the-art security protocols. Our findings suggest that wide-spread security problems exist even when protocols such as SSL and SSH are deployed because systems today do no...

Journal: :IACR Cryptology ePrint Archive 2011
Carl Bosley Kristiyan Haralambiev Antonio Nicolosi

We construct a simple authentication protocol whose security is based solely on the problem of Learning Parity with Noise (LPN) that is secure against Man-in-the-Middle attacks. Our protocol is suitable for RFID devices, whose limited circuit size and power constraints rule out the use of more heavyweight operations such as modular exponentiation. The protocol is extremely simple: both parties ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده ادبیات و زبانهای خارجی 1392

abstract this study aimed at investigating the possible relationship between self-assessment in writing and self-regulation of iranian efl learners. the main purpose of the study was not only to report and inform about this relationship, but also to investigate and find practical outcomes of the incorporation of self-assessment in writing, such as improving writing skill. the research was carr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید