Researchers insecure

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Logics for Insecure Communication

We present a general setting for dynarnlc-epistemic logics for communication, which can express announcements of different types (public or private, truthful or not, reliable or not, secure or not etc.), queries of the corresponding types, complex dialogues, dialogue games, strategies (protocols) for communication etc. We analyze some examples, we discuss various properties of dialogues (normal...

متن کامل

Secure Composition of Insecure Components

Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user’s desktop may now consist of many smaller components that interact in intricate ways. Some components will be downloaded from the network from sources that are only partially trusted. A user would like to know that a number of security properties hold, e.g. that persona...

متن کامل

Insecure "Provable Secure Network Coding"

Network coding allows the routers to mix the received information before forwarding them to the next nodes. Though this information mixing has been proven to maximize network throughput, it also introduces security challenges such as pollution attacks. A malicious node could insert a malicious packet into the system and this corrupted packet will propagate more quickly than in traditional copy-...

متن کامل

Quantum String Seal Is Insecure

A quantum string seal encodes the value of a (bit) string as a quantum state in such a way that everyone can extract a non-negligible amount of available information on the string by a suitable measurement. Moreover, such measurement must disturb the quantum state and is likely to be detected by an authorized verifier. In this way, the intactness of the encoded quantum state plays the role of a...

متن کامل

Trustworthy Routing Despite Insecure Providers

Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not!) been taken by their packets. Rather, it seems inevitable that as soon as a packet leaves the network card, the user is forced to trust the network provider to forward the packets as expected or agreed upon. This can be undesirable, especially in the light...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1981

ISSN: 0028-0836,1476-4687

DOI: 10.1038/292490c0