Perfect secrecy systems immune to spoofing attacks

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spoofing Attacks to 2d Face Recognition Systems with 3d Masks

Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biometric traits, face is the one that is exposed to the most serious threat, since it is exceptionally easy to access. The limited work on fraud detection capabilities for face mainly shapes around 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices. A signifi...

متن کامل

Revisiting Email Spoofing Attacks

The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...

متن کامل

Perfect Secrecy and Statistical

There are two key properties of the above. First, given only c, Eve should not be able to learn what m is. Second, Dec(Enc(m)) = m, so that Bob can accurately determine the message that Alice wanted to send. Creating functions Enc and Dec which satisfy this is a fundamental problem of cryptography. But given the above encryption scheme, knowing what these functions are is enough for anyone to d...

متن کامل

Non-invasive Spoofing Attacks for Anti-lock Braking Systems

This work exposes a largely unexplored vector of physical-layer attacks with demonstrated consequences in automobiles. By modifying the physical environment around analog sensors such as Antilock Braking Systems (ABS), we exploit weaknesses in wheel speed sensors so that a malicious attacker can inject arbitrary measurements to the ABS computer which in turn can cause lifethreatening situations...

متن کامل

Perfect Secrecy and Adversarial Indistinguishability

Claude Shannon introduced an entropy model for information, and applied it to secrecy in communications. It supposes a source of information, Alice, which chooses among a set of possible messages. There is associated with this choice a likelihood that Alice would chose a particular message. Symbols are then sent across a channel to Bob. These symbols should refine Bob’s likelihood function, emp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information Security

سال: 2012

ISSN: 1615-5262,1615-5270

DOI: 10.1007/s10207-012-0166-5