نتایج جستجو برای: forward traceability attack
تعداد نتایج: 203777 فیلتر نتایج به سال:
Recently Chen et al. have proposed a RFID access control protocol based on the strategy of indefinite-index and challenge-response. They have claimed that their protocol provides optimal location privacy and resists against man in the middle, spoofed tag and spoofed reader attacks. However, in this paper we show that Chen et al. protocol does not provide the claimed security. More precisely, we...
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
In this paper we present new constraints to EPCglobal Class 1 Generation 2 (EPCC1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead to prevent predecessor’s protocols’ weaknesses and also present the secure ones. Also in this paper as an example, we use Pang et al. EPC-C1 G2-friendly protocol which has been recently proposed, to ...
Blackburn, Etzion and Ng showed in a paper in 2010 that there exist 2-traceability codes of length l of size cqdl/4e, where the constant c depends only on l. The question remains as to what the best possible c may be. A well-known construction using error-correcting codes with high minimum distance gives 2-traceability codes of size cqdl/4e with c ≥ 1. However, in the same paper, an example of ...
Many anonymous communication (AC) networks rely on routing traffic through proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes risk sanctions by law enforcement if users commit illegal actions through the AC network. We present BACKREF, a generic mechanism for AC networks that provides practical repudiation for the proxy nodes by tracing...
Many anonymous communication networks (ACNs) rely on routing traffic through a sequence of proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes may become embroiled in a criminal investigation if originators commit criminal actions through the ACN. We present BackRef, a generic mechanism for ACNs that provides practical repudiation for th...
Recently Qian et al. [38] have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags’ private information. They have stated that most of the existing RFID mutual authentication protocols are vulnerable to this attack. To defend against counting attack, they propose a novel Anti-Counting Sec...
traceability is a basic requirement for the most of products from the viewpoint of governments and customers. it has base of quality systems and supports integration of supply chain information systems. this paper has presented a holistic model for supply chain traceability through structural equation modeling. this model will support recall of products, quality assurance requirements, improve ...
On complex and flexible industrial collaboration environments, manufacturing traceability has to move from a traditional internal enterprise activity-based view to a collaborative and distributed one. The objective is to implement global traceability: traceability of the whole manufacturing process when performed by several partner companies (extended enterprise). The paper proposes a model to ...
Traceability is the ability to map events in cyberspace, particularly on the Internet, back to real-world instigators, often with a view to holding them accountable for their actions. Anonymity is present when traceability fails. I examine how traceability on the Internet actually works, looking first at a classical approach from the late 1990s that emphasises the rôle of activity logging and r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید