The insecure environment

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Logics for Insecure Communication

We present a general setting for dynarnlc-epistemic logics for communication, which can express announcements of different types (public or private, truthful or not, reliable or not, secure or not etc.), queries of the corresponding types, complex dialogues, dialogue games, strategies (protocols) for communication etc. We analyze some examples, we discuss various properties of dialogues (normal...

متن کامل

Secure Authentication and Document Signature with Cryptogram Smart Card in an Insecure Environment

This paper describes a mechanism for secure online user authentication and document signature with a cryptogram Java card in an insecure environment. The mechanism requires possession of both the card and some secrets, known as Concepts, to authenticate the user. The concepts are represented in image form. A method of secure document signing with the concept-based images is also outlined. Possi...

متن کامل

Insecure Property and the Efficiency of Exchange*

We examine the effect of insecure property and its accompanying enforcement costs on the ef®ciency of exchange. Because of the large enforcement costs that may be induced by the expectation of exchange, limited settlement without exchange may be ex ante superior for an adversary or even Pareto dominant. We therefore show how the removal of restrictions on exchange and the development of secure ...

متن کامل

The Password Change Phase is Still Insecure

In 2004, W. C. Ku and S. M. Chen proposed an efficient remote user authentication scheme using smart cards to solve the security problems of Chien et al.’s scheme. Recently, Hsu and Yoon et al. pointed out the security weaknesses of the Ku and Chen’s scheme Furthermore, Yoon et al. also proposed a new efficient remote user authentication scheme using smart cards. Yoon et al. also modified the p...

متن کامل

Avoiding the Internet of Insecure Industrial Things

Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Inform...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Revista Brasileira de Saúde Materno Infantil

سال: 2023

ISSN: ['1806-9304', '1519-3829']

DOI: https://doi.org/10.1590/1806-9304202300000002-en