نتایج جستجو برای: security protocols

تعداد نتایج: 267913  

2014
Giampaolo Bella Frederic Blanqui Lawrence C. Paulson

1 Theory of Agents and Messages for Security Protocols 13 1.0.1 Inductive Definition of All Parts” of a Message . . . . . . 14 1.0.2 Inverse of keys . . . . . . . . . . . . . . . . . . . . . . . . 14 1.1 keysFor operator . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.2 Inductive relation ”parts” . . . . . . . . . . . . . . . . . . . . . . 15 1.2.1 Unions . . . . . . . . . . . . . . ...

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

Journal: :JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES 2019

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

Journal: :International Journal of Security and Networks 2008

Journal: :Internet of things and cyber-physical systems 2023

Journal: :ACM Transactions on Computational Logic 2015

Journal: :Mobile Networks and Applications 2016

Journal: :Information & Security: An International Journal 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید