نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

Journal: :IACR Cryptology ePrint Archive 2010
Tzu-Chang Yeh Yanjun Wang Tsai-Chi Kuo Sheng-Shih Wang

Radio Frequency IDentification (RFID) technology is a wireless identification method in which security and privacy are important parameters for public acceptance and widespread use. In order to thwart such security and privacy problems, a wide variety of authentication protocols have been proposed in the literature. In 2010, Yeh et al’s proposed a new RFID authentication protocol conforming to ...

Journal: :IACR Cryptology ePrint Archive 2006
Shenghui Su Yixian Yang Bo Yang Shaolan Zhang

The authors propose a new type of hash iterative structure ─ the ring-iterative structure with feedback which is subdivided into the single feedback ring iteration and the multiple feedback ring iteration, namely SFRI and MFRI. Prove that SFRI is at least equivalent to the MD structure in security, and MFRI is at least equivalent to SFRI in security (property 1 makes people incline to believe M...

2007
Mikaël Barbero Marcos Didonet Del Fabro Jean Bézivin

Establishing and using traceability and provenance between different models is a very important issue in complex software systems. Traceability in the small (local traceability) handles the trace information between model elements. Traceability in the large (global traceability) handles traceability information between models as a whole. Current solutions are more or less adhoc approaches that ...

Journal: :Wireless Personal Communications 2015
Hua Guo Yandong Zheng

Recently, in Journal of Security and Communication Networks (5(12):1363-1374, DOI: 10.1002/ sec.429), Wang et al. proposed a group key distribution scheme with self-healing property for wireless networks in which resource is constrained. They claimed that their key distribution scheme satisfies forward security, backward security and can resist collusion attack. Unfortunately, we found some sec...

Journal: :CoRR 2008
Julio César Hernández Castro Juan E. Tapiador Pedro Peris-Lopez Jean-Jacques Quisquater

In this work we present the first passive attack over the SASI lightweight authentication protocol with modular rotations. This can be used to fully recover the secret ID of the RFID tag, which is the value the protocol is designed to conceal. The attack is described initially for recovering blog2(96)c = 6 bits of the secret value ID, a result that by itself allows to mount traceability attacks...

2016
Zachary R. Manchester Jeffrey I. Lipton Robert J. Wood Scott Kuindersma

A micro aerial vehicle with a variable forward-sweep wing is proposed with the goal of enhancing performance and controllability during high-angle-of-attack perching maneuvers. Data is presented from a series of wind tunnel experiments to quantify the aerodynamic effects of forward sweep over a range of angles of attack from -25° to +75°. A nonlinear dynamics model is constructed using the wind...

2015
Hua Guo Yandong Zheng Biao Wang Zhoujun Li

In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for resource-constrained wireless networks in the journal of Sensors (14(14):24358-24380, doi: 10.3390/ s141224358). They asserted that their Scheme 2 achieves mt-revocation capability, mt-wise forward secrecy, any-wise backward secrecy and has mt-wise collusion attack resistance capability. Unfortunately, t...

Journal: :IACR Cryptology ePrint Archive 2017
Jun Liu Yupu Hu

Digital rights management is an important technique to protect digital contents from abuse. Usually it is confronted with severe challenges because of the untrusted environment its application executed in. This condition is formally described as white-box attack model. White-box cryptography aims at protecting software implementation of cryptographic algorithms from white-box attack, hence can ...

Journal: :I. J. Network Security 2014
Walid I. Khedr

RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications, different authentication schemes have been proposed to ...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi

In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید