نتایج جستجو برای: security protocols
تعداد نتایج: 267913 فیلتر نتایج به سال:
1 Theory of Agents and Messages for Security Protocols 13 1.0.1 Inductive Definition of All Parts” of a Message . . . . . . 14 1.0.2 Inverse of keys . . . . . . . . . . . . . . . . . . . . . . . . 14 1.1 keysFor operator . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.2 Inductive relation ”parts” . . . . . . . . . . . . . . . . . . . . . . 15 1.2.1 Unions . . . . . . . . . . . . . . ...
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید