نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

2016
Matteo Mauri Alessio Mulas Davide Ariu

We present a poster about a possible cyber-crime attack scenario based on data sciences, social engineering and open data. We want to raise awareness about dangers associated with the use of knowledge discovery techniques applied to open data by cyber-criminals. We hope this poster will spark interest in the topic.

2011
Eetu Luoma Timo Nyberg

Selecting appropriate technology strategy is crucial to those designing ICT-based offering for specific geographical market. The antecedents of adopting particular technology can be used to identify opportunities and barriers of entry, but further information is needed for technology management on how adoption would take place. In this paper, it is argued that deploying a scenario method facili...

2006
Emre Topak Sviatoslav Voloshynovskiy Oleksiy J. Koval Mariam E. Haroutunian José-Emilio Vila-Forcén Thierry Pun

In a data hiding communications scenario, geometrical attacks lead to a loss of reliable communications due to synchronization problems when the applied attack is unknown. In our previous work, information-theoretic analysis of this problem was performed for theoretic setups, i.e., when the length of communicated data sequences asymptotically approaches infinity. Assuming that the applied geome...

2007
Zhu Wang Huiyan Chen

In this paper, we present a new identity-based signature scheme with message recovery based on bilinear map. Our scheme is proved secure against existential forgery on adaptive chosen message and ID attack under the random oracle model. This new scheme shortens the total length of the original message and the appended signature and adapts to the ubiquitous network scenario very well.

Journal: :Physical review letters 2008
Stefano Pirandola Samuel L Braunstein Seth Lloyd

We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

2004
Vladimir Gorodetsky Igor Kotenko

The paper objective is to present a new formal framework for specification of scenario knowledge and beliefs bases supporting coalition operation dynamic coordinated planning. It is based on formal grammar model represented is matrix form and enriched by attributes and substitution operation allowing hierarchical specifications. This framework is demonstrated by an example presenting planning o...

2007
Andrzej Pacut Adam Czajka Przemek Strzelczyk

We propose a new iris texture coding technique with optimal feature extraction, and design a secure remote (internet) access system using the proposed biometrics. The proposed iris coding method is based on Zak-Gabor coefficients sequence, and additionally uses an optimal selection of a subset of iris features. The secure access involves a communication scenario that employs a usual client-serv...

Journal: :The Journal of rheumatology 1995
M B Ferraz B O'Brien

OBJECTIVE To determine in a Canadian health care setting the cost effectiveness of urate lowering drugs (ULD) in the treatment of nontophaceous gouty arthritis with recurrent attacks and to evaluate the least costly regimen among available ULD. METHODS A decision analysis model was designed using hypothetical cohort of patients who present 1 to 4 recurrent attacks/year. It incorporated costs ...

Journal: :CoRR 2015
Anjan K. N. K. Srinath Abraham Jibi

Covert channels is a vital setup in the analysing the strength of security in a network. Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation. The trap-door set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert scheme that enables to build rob...

Journal: :IACR Cryptology ePrint Archive 2010
Yongzhuang Wei Jiqiang Lu Yupu Hu

The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in 2005. In 2008, Demirci and Selçuk gave a meet-in-the-middle attack on 7-round AES under 192 key bits. In 2009, Demirci et al. (incorrectly) described a new meetin-the-middle attack on 7-round AES under 192 key bits. S...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید