نتایج جستجو برای: bad mouthing attack
تعداد نتایج: 110943 فیلتر نتایج به سال:
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
The NIST standard FF3 scheme (also known as BPS scheme) is a tweakable block cipher based on a 8-round Feistel Network. We break it with a practical attack. Our attack exploits the bad domain separation in FF3 design. The attack works with chosen plaintexts and tweaks when the message domain is small. Our FF3 attack requires O(N 11 6 ) chosen plaintexts with time complexity N, where N is domain...
Avid mouthing, the propensity of infants to suck objects and put them in their mouths, is a pattern characteristic of the first 2-3 years of life, with its most intensive manifestation occurring during the first year. Although traditional accounts explain infant mouthing as a source of sensual gratification and/or environmental exploration, these proximate hypotheses are inconsistent with the h...
We evaluated a response-blocking procedure for reducing the self-injurious hand mouthing of 2 adults with profound disabilities. The procedure reduced mouthing in both cases. The results suggest research is warranted to delineate the behavioral process responsible for the effect of response blocking and to determine the procedure's long-term utility.
To explain, the ratings provided by advisors are possibly unfair. Buyers may provide unfairly high ratings to promote the seller. This is referred to as “ballot stuffing” (Dellarocas 2000). Buyers may also provide unfairly low ratings, in order to cooperate with other sellers to drive a seller out of the marketplace. This is referred to as “bad-mouthing”. Besides the problem of unfair ratings, ...
Trust recommendations, having a pivotal role in computation of trust and hence confidence in peer to peer (P2P) environment, if hampered, may entail in colossal attacks from dishonest recommenders such as bad mouthing, ballot stuffing, random opinion etc. Therefore, mitigation of dishonest trust recommendations is stipulated as a challenging research issue in P2P systems (esp in Mobile Ad Hoc N...
In this paper, we address the problem of designing a robust reputation mechanism for peer-to-peer services. The mechanism we propose achieves high robustness against malicious peers (from individual or collusive ones) and provides incentive for participation. We show that the quality of the reputation value of trustworthy and participating peers is always better than the one of cheating and non...
Oral and manual exploration are part of the foundation of problem solving and cognition in infancy. How these develop in an at-risk population, infants in poverty, is unknown. The current study tested exploratory behaviors longitudinally at 6, 9, and 12 months in infants from high- and low-socioeconomic (SES) families. Oral exploration consisted of passive and active mouthing and looks after ac...
A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting the number of (bad) IDs to a minority is critical for tolerating malicious behavior. popular tool enforcing bad resource burning (RB): verifiable consumption network resource. Unfortunately, typical RB defenses require non-Sybil (good) consume at least as many resources adversary. We present new defense...
P2P communities can be seen as truly Distributed Computing applications in which group members communicate with one another to exchange information. The authors consider security issues in Peer to Peer Networks. For secure exchange of data between the group members the authors present a cryptography protocol and an Identity mechanism which can able to check even the Trust of the Peers based on ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید