نتایج جستجو برای: forward traceability attack
تعداد نتایج: 203777 فیلتر نتایج به سال:
Recently, two certificateless three-party authenticated key agreement protocols were proposed, and both protocols were claimed they can meet the desirable security properties including forward security, key compromise impersonation resistance and so on. Through cryptanalysis, we show that one neither meets forward security and key compromise impersonation resistance nor resists an attack by an ...
Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted database (EDB) systems as secure cloud storage. In this work, we study the leakage of OPE and ORE and their forward security. We propose generic yet powerful file-injection attacks (FIAs) on OPE/ORE, aimed at the situations of possessing order by and range queries. The FIA schemes...
Wireless sensor networks are composed of a large number of sensors and their major challenge is energy consumption in order to prolong the life time of the network. From the security point of view, detecting schemes must be very light to increase the life time of the network. In this paper, defensive mechanisms based on cumulative acknowledgement and energy based is proposed to detect selective...
Requirements traceability is central to the issue of requirements management, which is essential for producing quality software. Our focus on requirements traceability addresses aspects related to software development and evolution. Our survey deals both with technical and managerial aspects and aims at contextualizing requirements traceability as well as providing basic reference on the subjec...
Abstract Traceability is the capability to represent, understand and analyze relationships between software artefacts. at core of many engineering activities. This a blessing in disguise as traceability research scattered among various subfields, which impairs global view integration different innovations around recording, identification, evaluation management traces. also limits adoption solut...
Requirements traceability offers many benefits to software projects, and it has been identified as critical for successful development. However, numerous challenges face the implementation of traceability in the software engineering industry. Some of these challenges can be overcome through organizational policy and procedure changes, but the lack of cost-effective traceability models and tools...
RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model
Secure authentication of low cost Radio Frequency Identification (RFID) tag with limited resources is a big challenge, especially when we simultaneously consider anonymity, un-traceability, and forward secrecy. The popularity of Internet of Things (IoT) further amplifies this challenge, as we should authenticate these mobile tags in the partialdistributed-server environments. In this paper, we ...
Software traceability is the ability to relate artefacts created during the development life cycle of software system. Traceability is essential in the software development process and it has been used to support several activities such as impact analysis, software maintenance and evolution, component reuse, verification and validation. Moreover, the importance of traceability in the software d...
Traceability exists in many food supply chains for valid economic reasons, one of which is improving food safety and quality. Some politicians and consumer groups are calling for increased identity preservation in systems where traceability has not yet been adopted. In this paper, we explore the implications of adding traceability to a food supply chain that already includes an inspection proto...
Software traceability is a required component of many software development processes. Advocates of requirements traceability cite advantages like easier program comprehension and support for software maintenance (i.e., software change). However, despite its growing popularity, there exists no published evaluation about the usefulness of requirements traceability. It is important, if not crucial...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید