نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

2011
RUI JIANG MEHDI AZARMI TAO GONG

Secure and dynamic clustering protocols, which are essential in wireless sensor network, are becoming a heated research area. However, the proposed protocols are vulnerable to wormhole attack. Most recently, SecDEACH protocol is proposed and claimed to provide both the resilient cluster head election, preserving a dynamic clustering, and the secure cluster formation. In this paper, we demonstra...

2006
Huiyan Chen Shuwang Lü Zhenhua Liu Qing Chen

In this paper, we give a new identity-based signcryption scheme based on pairings. It is secure against adaptive chosen ciphertext and identity attack in the random oracle with the Modified Bilinear Diffie-Hellman assumption [14]. It produces shorter ciphertext than any one of schemes [7],[14] for the same plaintext and adapts to the bandconstrained scenario very well.

Journal: :I. J. Bifurcation and Chaos 2006
Shujun Li Guanrong Chen Gonzalo Álvarez

As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defensive mechanism was presented to enhance the security of chaotic parameter modulation schemes against return-map attacks. Two techniques are combined in the proposed defensive mechanism: multistep parameter modulation a...

Milkica Janeva, Pavlinka Kokoskarova Rubin Gulaboski,

In this theoretical work, we present for the first time voltammetric results of a surface multistep electron transfer mechanism that is associated with a preceding chemical reaction that is linked to the first electron transfer step. The mathematical model of this so-called “surface CEE mechanism” is solved under conditions of square-wave voltammetry. We present relevant set of results portrayi...

2016
Matteo Mauri Alessio Mulas Davide Ariu

We present a poster about a possible cyber-crime attack scenario based on data sciences, social engineering and open data. We want to raise awareness about dangers associated with the use of knowledge discovery techniques applied to open data by cyber-criminals. We hope this poster will spark interest in the topic.

2011
Eetu Luoma Timo Nyberg

Selecting appropriate technology strategy is crucial to those designing ICT-based offering for specific geographical market. The antecedents of adopting particular technology can be used to identify opportunities and barriers of entry, but further information is needed for technology management on how adoption would take place. In this paper, it is argued that deploying a scenario method facili...

2006
Emre Topak Sviatoslav Voloshynovskiy Oleksiy J. Koval Mariam E. Haroutunian José-Emilio Vila-Forcén Thierry Pun

In a data hiding communications scenario, geometrical attacks lead to a loss of reliable communications due to synchronization problems when the applied attack is unknown. In our previous work, information-theoretic analysis of this problem was performed for theoretic setups, i.e., when the length of communicated data sequences asymptotically approaches infinity. Assuming that the applied geome...

2007
Zhu Wang Huiyan Chen

In this paper, we present a new identity-based signature scheme with message recovery based on bilinear map. Our scheme is proved secure against existential forgery on adaptive chosen message and ID attack under the random oracle model. This new scheme shortens the total length of the original message and the appended signature and adapts to the ubiquitous network scenario very well.

Journal: :Physical review letters 2008
Stefano Pirandola Samuel L Braunstein Seth Lloyd

We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

2004
Vladimir Gorodetsky Igor Kotenko

The paper objective is to present a new formal framework for specification of scenario knowledge and beliefs bases supporting coalition operation dynamic coordinated planning. It is based on formal grammar model represented is matrix form and enriched by attributes and substitution operation allowing hierarchical specifications. This framework is demonstrated by an example presenting planning o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید