نتایج جستجو برای: sadra in man
تعداد نتایج: 16990827 فیلتر نتایج به سال:
Recent attacks on the German identity card show that a compromised client computer allows for PIN compromise and man-inthe-middle attacks on eID cards. We present a selection of new solutions to that problem which do not require changes in the card specification. All presented solutions protect against PIN compromise attacks, some of them additionally against man-in-the-middle attacks.
This paper discusses a new protocol implementing authentication in a multi-located environment that avoids man-in-the-middle (MIM) attack, replay attack and provides privacy, integrity of a message for multi-located parties. The protocol uses the concept that each party is associated with a subsidiary agent.
Authentication with recently proposed quantum password protocol is secure against impersonation. Here we show that original version of the protocol is not secure against active malicious prover and verifier, however a slight modification provides a possibility for a legitimate party to detect the attacks. The password is reusable in the absence of the attacks. Otherwise the security of the auth...
With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-midd...
In the article we show an attack on the cryptographic protocol of electronic auction with extended requirements [1]. The found attack consists of authentication breach and secret retrieval. It is a kind of “man in the middle attack”. The intruder impersonates an agent and learns some secret information. We have discovered this flaw using OFMC an automatic tool of cryptographic protocol verifica...
As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that supp...
Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-the-Middle (MiTM) attacks. A number of techniques have been proposed to address the problem, butmany are not applicable to devices lacking required interfaces, such as displays or speakers. In this paper, we introduce a new secure...
MOTIVATION Identifying single nucleotide polymorphisms (SNPs) that underlie common and complex human diseases, such as cancer, is of major interest in current molecular epidemiology. Nevertheless, the tremendous number of SNPs on the human genome requires computational methods for prioritizing SNPs according to their potentially deleterious effects to human health, and as such, for expediting g...
To help the biomedical scientist pre-confirm the disease-related genes, we considered these gene as a whole research set and analyzed the topological features of their interaction network. Two strategies had been proposed to construct the disease-related gene network from the OMIM database. Using these two constructed sets, we trained two support vector machine prediction models, the accuracy o...
Rare diseases knowledge management: the contribution of proximity measurements in OntoOrpha and OMIM
In this paper, we introduce an application of Proxima and define a new measure of proximity between two concepts present in an ontology. The approach is based on the three dimensions of a conceptualization: intention with relations between concepts, expression with terms denoting concepts, and extension with instances of concepts. This preliminary work, in the field of rare diseases, involved t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید