نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

Journal: :CoRR 2017
Giuliano Antoniol Jane Cleland-Huang Jane Huffman Hayes Michael Vierhauser

In 2007, the software and systems traceability community met at the first Natural Bridge symposium on the Grand Challenges of Traceability to establish and address research goals for achieving effective, trustworthy, and ubiquitous traceability. Ten years later, in 2017, the community came together to evaluate a decade of progress towards achieving these goals. These proceedings document some o...

2011
Bai Qu Xinchao Jing Xiaojun Wang Ying Li Yong Liang

With the development of science and technology, the problem about the quality safety traceability of agricultural products has already become the hot topic of researchers in various fields. Cucumber is one of the main vegetable crops in China. It is convenient for eating and contains various beneficial minerals. With the constant expansion of the planting areas, it plays a more and more importa...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Pedro Peris-Lopez Julio César Hernández Castro Nasour Bagheri Majid Naderi

Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and desynchronization attacks. In this paper we cryptanalysis a hash based RFID mutual authentication protocol which has been recently proposed by Cho et al. More precisely, w...

Journal: :CoRR 2016
Karim Emara Wolfgang Wörndl Johann H. Schlichter

Vehicular adhoc networks allow vehicles to share their information for safety and traffic efficiency. However, sharing information may threaten the driver privacy because it includes spatiotemporal information and is broadcast publicly and periodically. In this paper, we propose a contextadaptive pseudonym changing scheme which lets a vehicle decide autonomously when to change its pseudonym and...

Journal: :Security and Communication Networks 2014
Nasour Bagheri Masoumeh Safkhani Pedro Peris-Lopez Juan E. Tapiador

Tian et al. proposed a novel ultralightweight RFID mutual authentication protocol [4] that has recently been analyzed in [1], [2], [5]. In this letter, we first propose a desynchronization attack that succeeds with probability almost 1, which improves upon the 0.25 given by the attack in [1]. We also show that the bad properties of the proposed permutation function can be exploited to disclose ...

2010
Julio César Hernández Castro Pedro Peris-Lopez Raphael C.-W. Phan Juan E. Tapiador

In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a quite powerful cryptanalytic attack against their proposal: we start with a traceability attack, then describe how it can be extended to leak long-term stored secrets, and finally present a full disclosure attack (named...

Journal: :IACR Cryptology ePrint Archive 2012
Nasour Bagheri Masoumeh Safkhani Pedro Peris-Lopez Juan E. Tapiador

Tian et al. proposed a novel ultralightweight RFID mutual authentication protocol [4] that has recently been analyzed in [1], [2], [5]. In this letter, we first propose a desynchronization attack that succeeds with probability almost 1, which improves upon the 0.25 given by the attack in [1]. We also show that the bad properties of the proposed permutation function can be exploited to disclose ...

Journal: :IEEE Software 2002
Gerald Ebner Hermann Kaindl

0 7 4 0 7 4 5 9 / 0 2 / $ 1 7 . 0 0 © 2 0 0 2 I E E E during the reengineering process. We propose tracing “all around”—from existing code to the legacy system’s design to its requirements during reverse engineering, and from the modified requirements to the new design and the new code during development of the successor system. In effect, this means integrating traceability during reverse engi...

2002
Jeremy Dick

Creating traceability through the use of links between paragraphs of documents, or between objects in a requirements database, is a great step forward for many systems engineering organisations. It enables analysis of impact, coverage and derivation to be performed, and greatly improves the requirements management process. However, the semantics of the relationship induced by such links is very...

Journal: :IEEE Trans. Information Theory 2000
Reihaneh Safavi-Naini Yejing Wang

Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Tassa proposed dynamic traitor tracing schemes that can detect all traitors if they attempt to rebroadcast the content after it is decrypted. In their scheme the content is broken into segments and marked so that a re-b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید