نتایج جستجو برای: forward traceability attack
تعداد نتایج: 203777 فیلتر نتایج به سال:
Traceability, the ability to track parts and products, is a necessity for many enterprise applications. These include pilferage reduction, counterfeit prevention, and targeted recalls. In this paper, we share lessons learned from a comparative analysis of two state of the art traceability data management systems: a federated system for parts traceability; and a distributed system for distributi...
The Food & Drug Administration has begun requiring that electronic submissions of regulated clinical studies utilize the Clinical Data Information Standards Consortium data standards. Within regulated clinical research, traceability is a requirement and indicates that the analysis results can be traced back to the original source data. Current solutions for clinical research data traceability a...
Traceability of software artifacts, from requirements to design and through implementation and quality assurance, has long been promoted by the research and expert practitioner communities. However, evidence indicates that, with the exception of those operating in the safety critical domain, few software companies choose to implement traceability processes, in the most part due to cost and comp...
This paper shows some insecurities in Xu’s forward secure multi-proxy signature scheme. There are two kinds of attacks on this scheme: (1) anyone can forge some certain messages which to be sign and cannot detect by the signature verifier. (2) This scheme can’t resist the dishonest signer forgery attack by forging its own public key. After that, the paper proposed two new forward-secure multi-p...
The User Authentication mechanism technology has enjoyed strong growth in recent year, but security threats and facing attacks in authentication have grown equally fast. Today, there are many potential attacks that are targeted at authentication including insider attack, masquerade attack, server spoofing attack, parallel session attack, offline password guessing attack and many more. Recently,...
In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for resource-constrained wireless networks in Journal of Sensors (14(14):24358-24380, DOI: 10.3390/ s141224358). They asserted that their scheme 2 has the constant storage overhead, low communication overhead, and is secure, i.e., achieves mt-revocation capability, mt-wise forward secrecy, any-wise backward ...
[Context & motivation] Traceability of software engineering artifacts is important in software development. Tools are used to establish traceability between software engineering artifacts. [Problem] One of the open traceability challenges is the traceability-configuration during usage. At any time within a project, the traceability information model (TIM) should be adaptable to changing context...
Traceability is an important concern in projects that span different engineering domains. In such projects, traceability can be used across the engineering lifecycle and therefore is multi-domain, involving heterogeneous models. We introduce the concept and challenges of multidomain traceability and explain how it can be used to support traceability scenarios. We describe how to build a multi-d...
We advance the state-of-the-art in automated symbolic analysis for e-voting protocols by introducing three conditions that together are sufficient to guarantee ballot secrecy. There are two main advantages to using our conditions, compared to existing automated approaches. The first is a substantial expansion of the class of protocols and threat models that can be automatically analysed: we can...
Forward secrecy is one of the important properties of remote user authentication schemes to limit the effects of eventual failure of the entire system when the long-term private keys of one or more parties are compromised. Recently, Tsai et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails to achieve user anonymity and is vulnerable to user impersonation att...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید