نتایج جستجو برای: untraceability
تعداد نتایج: 141 فیلتر نتایج به سال:
This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concerning authentication, untraceability, and secrecy are discussed. We demonstrate the types of attacks by exhibiting previously unpublished vulnerabilities in several protocols and referring to various other flawed protocols. The ...
How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol
The recent hot debate on "mobile sharing economy" has been an emergence in a dynamic ownership economy, which attracts lots of attentions in the news media. The concept and practice of resource sharing has been fast becoming a mainstream phenomenon across the world. People share assets to their friends via Internet or smartphones. Meanwhile, researchers are now beginning to weigh in with deeper...
In recent years, the Internet of things (IoT) has become an encouraging communication paradigm that numerous applications including smart city, home and intelligent transportation system. The information sensed by several IoT devices can be security stored at (cloud) servers. An external user, being a client, access services from server for sensing information, provided mutual authentication ha...
Due to the complexity and untraceability of grouting process underpinning slurry diffusion law, current study on properties alluvial filler soil lags behind engineering application. Therefore, model tests, including a laboratory test dynamic penetration test, are developed in this investigate law strength characteristics soil. Through excavation model, pattern can be observed precisely. Then an...
| The amount of mobile and nomadic computing is expected to increase dramatically in the near future. Hand in hand with this ubiquitous mobile computing security and privacy problems show up, which have not been dealt with suf-cently up to now. The main problems are traac analysis and the easy access to location information, for example in the popular Internet just by looking at the address hea...
Authentication and key agreement protocol is indispensable for today network applications. Many two-factor authentication and key agreement protocols using smart card and password have been proposed over the last decade. However, many of these schemes are vulnerable to password guessing attack due to low-entropy passwords. In this paper, we show how to mount an offline password guessing attack ...
The radio frequency identification (RFID) protocols are vulnerable to various attacks from an active or passive adversary. We shed light upon some existing security flaws in these delegation protocols. It is useful to mitigate many security weaknesses in such delegation protocols to promote the acceptance of RFID tags. We propose that a scalable RFID delegation protocol will be against traceabi...
Forensic method which determine the forgery in the image. Similarly, Anti-forensic technique which makes fool of the forensics detectors and hides the trace of the operation done in the image. Now, we are proposing the anti-forensic method by using four steps. The first step normalize the image coefficients using total variation in the deblocking artifacts. The second work which uses dithering ...
An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic Identity
To keep the pace with the development of internet technology, remote user authentication techniques become more and more important to protect user’s privacy. Recently, Kumari, et al., presented an improved remote user authentication scheme with key agreement based on dynamic-identity using smart card. This scheme allows legal users to change the password at his will without the need to connect ...
Multi-server authentication schemes are very practical from a user point of view, since they allow a user to get access to different services on different servers with one single registration. Smart card based approaches lead to more secure systems because they offer two-factor authentication, based on the strict combination of user's password and the possession of the smart card. In this paper...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید