نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi

Recently Chen et al. have proposed a RFID access control protocol based on the strategy of indefinite-index and challenge-response. They have claimed that their protocol provides optimal location privacy and resists against man in the middle, spoofed tag and spoofed reader attacks. However, in this paper we show that Chen et al. protocol does not provide the claimed security. More precisely, we...

Journal: :IACR Cryptology ePrint Archive 2013
Masoumeh Safkhani Nasour Bagheri

In this paper we present new constraints to EPCglobal Class 1 Generation 2 (EPCC1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead to prevent predecessor’s protocols’ weaknesses and also present the secure ones. Also in this paper as an example, we use Pang et al. EPC-C1 G2-friendly protocol which has been recently proposed, to ...

Journal: :Australasian J. Combinatorics 2015
S.-L. Ng S. Owen

Blackburn, Etzion and Ng showed in a paper in 2010 that there exist 2-traceability codes of length l of size cqdl/4e, where the constant c depends only on l. The question remains as to what the best possible c may be. A well-known construction using error-correcting codes with high minimum distance gives 2-traceability codes of size cqdl/4e with c ≥ 1. However, in the same paper, an example of ...

Journal: :CoRR 2013
Michael Backes Jeremy Clark Peter Druschel Aniket Kate Milivoj Simeonovski

Many anonymous communication (AC) networks rely on routing traffic through proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes risk sanctions by law enforcement if users commit illegal actions through the AC network. We present BACKREF, a generic mechanism for AC networks that provides practical repudiation for the proxy nodes by tracing...

2014
Michael Backes Jeremy Clark Aniket Kate Milivoj Simeonovski Peter Druschel

Many anonymous communication networks (ACNs) rely on routing traffic through a sequence of proxy nodes to obfuscate the originator of the traffic. Without an accountability mechanism, exit proxy nodes may become embroiled in a criminal investigation if originators commit criminal actions through the ACN. We present BackRef, a generic mechanism for ACNs that provides practical repudiation for th...

Journal: :J. Computational Applied Mathematics 2011
Masoumeh Safkhani Nasour Bagheri Ali Mahani

Recently Qian et al. [38] have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags’ private information. They have stated that most of the existing RFID mutual authentication protocols are vulnerable to this attack. To defend against counting attack, they propose a novel Anti-Counting Sec...

Journal: :مدیریت صنعتی 0
جعفر رزمی دانشکده¬های فنی، دانشگاه تهران، ایران رضا توکلی مقدم پردیس دانشکده¬های فنی، دانشگاه تهران، ایران فریبرز جولای پردیس دانشکده¬های فنی، دانشگاه تهران، ایران بابک یاری پردیس دانشکده¬های فنی، دانشگاه تهران، ایران

traceability is a basic requirement for the most of products from the viewpoint of governments and customers. it has base of quality systems and supports integration of supply chain information systems. this paper has presented a holistic model for supply chain traceability through structural equation modeling. this model will support recall of products, quality assurance requirements, improve ...

2006
JULIO GARRIDO JUAN SAEZ LOPEZ JOSE IGNACIO

On complex and flexible industrial collaboration environments, manufacturing traceability has to move from a traditional internal enterprise activity-based view to a collaborative and distributed one. The objective is to implement global traceability: traceability of the whole manufacturing process when performed by several partner companies (extended enterprise). The paper proposes a model to ...

2005
Richard Clayton

Traceability is the ability to map events in cyberspace, particularly on the Internet, back to real-world instigators, often with a view to holding them accountable for their actions. Anonymity is present when traceability fails. I examine how traceability on the Internet actually works, looking first at a classical approach from the late 1990s that emphasises the rôle of activity logging and r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید