نتایج جستجو برای: 18911001891100total increase in man

تعداد نتایج: 17012179  

2012
Johannes Braun Moritz Horsch Alexander Wiesmaier

Recent attacks on the German identity card show that a compromised client computer allows for PIN compromise and man-inthe-middle attacks on eID cards. We present a selection of new solutions to that problem which do not require changes in the card specification. All presented solutions protect against PIN compromise attacks, some of them additionally against man-in-the-middle attacks.

Journal: :CoRR 2011
Pradeep Kumar Dantala

This paper discusses a new protocol implementing authentication in a multi-located environment that avoids man-in-the-middle (MIM) attack, replay attack and provides privacy, integrity of a message for multi-located parties. The protocol uses the concept that each party is associated with a subsidiary agent.

2016
E. Karpov

Authentication with recently proposed quantum password protocol is secure against impersonation. Here we show that original version of the protocol is not secure against active malicious prover and verifier, however a slight modification provides a possibility for a legitimate party to detect the attacks. The password is reusable in the absence of the attacks. Otherwise the security of the auth...

Journal: :محیط شناسی 0
طیبه اکبری راد دانشگاه آزاد اسلامی واحد تهران شمال، استادیار گروه الهیات و معارف اسلامی، رشته علوم قرآن و حدیث

environmental degradation all over the world is one of the three major concerns of the human being. depletion of fresh water sources on earth, ozone layer depletion, soil degradation, intensive farming, climate change and temperature increase, biodiversity loss, population increase, poverty, pollution, extinction of rare species, biological extinction and endangered species are the main environ...

2009
Sajid Hussain Md. Shafayat Rahman

With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-midd...

Journal: :Annales UMCS, Informatica 2007
Bogdan Ksiezopolski Pascal Lafourcade

In the article we show an attack on the cryptographic protocol of electronic auction with extended requirements [1]. The found attack consists of authentication breach and secret retrieval. It is a kind of “man in the middle attack”. The intruder impersonates an agent and learns some secret information. We have discovered this flaw using OFMC an automatic tool of cryptographic protocol verifica...

Journal: :CoRR 2012
K. Saravanan L. Vijayanand R. K. Negesh

As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that supp...

Journal: :IJSN 2009
Claudio Soriente Gene Tsudik Ersin Uzun

Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-the-Middle (MiTM) attacks. A number of techniques have been proposed to address the problem, butmany are not applicable to devices lacking required interfaces, such as displays or speakers. In this paper, we introduce a new secure...

Background: Marital satisfaction is one of the most important factors in the stability of the family. In recent years, by changing the pattern of marriage we can see the increase of marriages in which the women are older than men. The aim of this study was assessing the marital satisfaction in older woman-younger man marriages. Methods: In this descriptive-analytic study, 52 couples from Najaf...

Journal: :Bioinformatics 2009
Phil Hyoun Lee Hagit Shatkay

MOTIVATION Identifying single nucleotide polymorphisms (SNPs) that underlie common and complex human diseases, such as cancer, is of major interest in current molecular epidemiology. Nevertheless, the tremendous number of SNPs on the human genome requires computational methods for prioritizing SNPs according to their potentially deleterious effects to human health, and as such, for expediting g...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید