Protocol Analysis
نویسندگان
چکیده
منابع مشابه
Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
متن کاملExploring Language Learners’ Cognitive Processes in On-line ESP Courses via Think-aloud Protocol Analysis
The present study aims to investigate language learners’ cognitive processes in on-line ESP courses. Three modes of inquiry are used: think-aloud protocol analysis, screen capture analysis, and correlation analysis. The theoretical foundations for the evaluation of the cognitive aspect of Ferdowsi Univeristy of Mashhad E-learning System are drawn from cognitive load theory, cognitive apprentice...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملA Protocol for Pollution Index, Source Identification, and Spatial Analysis of Heavy Metals in Top Soil
Introduction: This study aimed to assess a good protocol for the contamination indexes, concentration, spatial analysis, and source identification of toxic metals in top soils. Materials and Methods: In the first step, samples were taken from top soil (30 cm) and the metals were extracted and detected with ICP-AES. In the second step, Enrichment Factor, Geoaccumulation Index, and Contamination...
متن کاملCan we Replace Arterial Blood Gas Analysis by Pulse Oximetry in Neonates with Respiratory Distress Syndrome, who are Treated According to INSURE Protocol?
Neonates with respiratory distress syndrome (RDS), who are treated according to INSURE protocol; require arterial blood gas (ABG) analysis to decide on appropriate management. We conducted this study to investigate the validity of pulse oximetry instead of frequent ABG analysis in the evaluation of these patients. From a total of 193 blood samples obtained from 30 neonates <1500 grams with RDS,...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کامل