Guessing Attacks on Distributed-Storage Systems
نویسندگان
چکیده
منابع مشابه
Hybrid Regenerating Codes for Distributed Storage Systems
Distributed storage systems are mainly justified due to their ability to store data reliably over some unreliable nodes such that the system can have long term durability. Recently, regenerating codes are proposed to make a balance between the repair bandwidth and the storage capacity per node. This is achieved through using the notion of network coding approach. In this paper, a new variation ...
متن کاملThermal Attacks on Storage Systems
Disk drives are a performance bottleneck for data-intensive applications. Drive manufacturers have continued to increase the rotational speeds to meet performance requirements, but the faster drives consume more power and run hotter. Future drives will soon be operating at temperatures that threaten drive reliability. One strategy that has been proposed for increasing drive performance without ...
متن کاملUndetectable On{line Password Guessing Attacks Undetectable On-line Password Guessing Attacks
Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...
متن کاملGuessing Attacks on Strong-Password Authentication Protocol
Password authentication is the most important and convenient protocol for verifying users to get the system’s resources. Lin et al. had proposed an optimal strongpassword authentication protocol (OSPA) which is a onetime password method. It can protect against the replaying attacks, impersonation attacks, and denial of service attacks. However, the authors shall show that the OSPA protocol is v...
متن کاملSecure Authentication Protocols Resistant to Guessing Attacks
Users are normally authenticated via their passwords in computer systems. Since people tend to choose passwords that can be easily remembered, the systems are under the threat of guessing attacks. Many authentication and key distribution protocols have been proposed to protect user passwords from guessing attacks. However, these protocols either are limited to some specific environments or incu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2019
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2019.2933000