نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

Journal: :JoWUA 2013
Jian Xu Yuxi Li Jingwei Miao Fucai Zhou

Due to the increasingly serious information attacks in network times, the electronic commerce is facing additional challenges in the aspects of security and efficiency. Therefore, in this paper, we propose a new practical e-cash protocol based on dynamic group signature in BSZ model, using the NonInteractive Zero-Knowledge proofs system. And it is proved that our protocol satisfies anonymity wh...

Journal: :J. Comput. Syst. Sci. 2014
Kaiping Xue Peilin Hong Changsha Ma

Traditional password based authentication schemes are mostly considered in single server environments. They are unfitted for the multi-server environments from two aspects. On the one hand, users need to register in each server and to store large sets of data, including identities and passwords. On the other hand, servers are required to store a verification table containing user identities and...

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

Journal: :JCIT 2010
Hongyuan Li Guangjie Liu Yuewei Dai Zhiquan Wang

Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequenc...

Journal: :IEEE Trans. Information Theory 2003
Alice Silverberg Jessica Staddon Judy L. Walker

We apply results from algebraic coding theory to solve problems in cryptography, by using recent results on list decoding of error-correcting codes to efficiently find traitors who collude to create pirates. We produce schemes for which the TA (traceability) traitor tracing algorithm is very fast. We compare the TA and IPP (identifiable parent property) traitor tracing algorithms, and give evid...

2016
Venkata Krishna Rao Pabolu Roland Stolt Joel Johansson

This paper is a summary of master thesis written in the fall of 2015 in the department of Product Development in Jonkoping University in Sweden as a part of a research project with focus on the implementation and management of systems for design automation and design for manufacturing. It includes an implementation with the aim of enhancing a system currently in operation at an aerospace suppli...

2010
Mihui Kim Kijoon Chae

To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we presen...

2005
JILL E. HOBBS

Improving food safety, reducing the impacts of food safety problems, and providing a means to verify food quality attributes are driving the development of traceability initiatives in agri-food systems. Numerous and varied examples exist, from regulatory traceability initiatives, to industry-wide livestock traceability programmes, to individual supply-chain systems that combine traceability wit...

Journal: :Remote Sensing 2016
Antoine Borraccino Michael Courtney Rozenn Wagner

Nacelle-based Doppler wind lidars have shown promising capabilities to assess power performance, detect yaw misalignment or perform feed-forward control. The power curve application requires uncertainty assessment. Traceable measurements and uncertainties of nacelle-based wind lidars can be obtained through a methodology applicable to any type of existing and upcoming nacelle lidar technology. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید