نتایج جستجو برای: attack scenario
تعداد نتایج: 169475 فیلتر نتایج به سال:
We present a poster about a possible cyber-crime attack scenario based on data sciences, social engineering and open data. We want to raise awareness about dangers associated with the use of knowledge discovery techniques applied to open data by cyber-criminals. We hope this poster will spark interest in the topic.
Selecting appropriate technology strategy is crucial to those designing ICT-based offering for specific geographical market. The antecedents of adopting particular technology can be used to identify opportunities and barriers of entry, but further information is needed for technology management on how adoption would take place. In this paper, it is argued that deploying a scenario method facili...
In a data hiding communications scenario, geometrical attacks lead to a loss of reliable communications due to synchronization problems when the applied attack is unknown. In our previous work, information-theoretic analysis of this problem was performed for theoretic setups, i.e., when the length of communicated data sequences asymptotically approaches infinity. Assuming that the applied geome...
In this paper, we present a new identity-based signature scheme with message recovery based on bilinear map. Our scheme is proved secure against existential forgery on adaptive chosen message and ID attack under the random oracle model. This new scheme shortens the total length of the original message and the appended signature and adapts to the ubiquitous network scenario very well.
Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.
The paper objective is to present a new formal framework for specification of scenario knowledge and beliefs bases supporting coalition operation dynamic coordinated planning. It is based on formal grammar model represented is matrix form and enriched by attributes and substitution operation allowing hierarchical specifications. This framework is demonstrated by an example presenting planning o...
We propose a new iris texture coding technique with optimal feature extraction, and design a secure remote (internet) access system using the proposed biometrics. The proposed iris coding method is based on Zak-Gabor coefficients sequence, and additionally uses an optimal selection of a subset of iris features. The secure access involves a communication scenario that employs a usual client-serv...
OBJECTIVE To determine in a Canadian health care setting the cost effectiveness of urate lowering drugs (ULD) in the treatment of nontophaceous gouty arthritis with recurrent attacks and to evaluate the least costly regimen among available ULD. METHODS A decision analysis model was designed using hypothetical cohort of patients who present 1 to 4 recurrent attacks/year. It incorporated costs ...
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation. The trap-door set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert scheme that enables to build rob...
The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in 2005. In 2008, Demirci and Selçuk gave a meet-in-the-middle attack on 7-round AES under 192 key bits. In 2009, Demirci et al. (incorrectly) described a new meetin-the-middle attack on 7-round AES under 192 key bits. S...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید