نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

2008
Karin Murthy Christine Robson

Traceability, the ability to track parts and products, is a necessity for many enterprise applications. These include pilferage reduction, counterfeit prevention, and targeted recalls. In this paper, we share lessons learned from a comparative analysis of two state of the art traceability data management systems: a federated system for parts traceability; and a distributed system for distributi...

2017
Sam Hume Surendra Sarnikar Lauren B. Becnel Dorine Bennett

The Food & Drug Administration has begun requiring that electronic submissions of regulated clinical studies utilize the Clinical Data Information Standards Consortium data standards. Within regulated clinical research, traceability is a requirement and indicates that the analysis results can be traced back to the original source data. Current solutions for clinical research data traceability a...

2012
Gilbert Regan Fergal McCaffery Kevin McDaid Derek Flood

Traceability of software artifacts, from requirements to design and through implementation and quality assurance, has long been promoted by the research and expert practitioner communities. However, evidence indicates that, with the exception of those operating in the safety critical domain, few software companies choose to implement traceability processes, in the most part due to cost and comp...

Journal: :JNW 2011
Jun Zhang

This paper shows some insecurities in Xu’s forward secure multi-proxy signature scheme. There are two kinds of attacks on this scheme: (1) anyone can forge some certain messages which to be sign and cannot detect by the signature verifier. (2) This scheme can’t resist the dishonest signer forgery attack by forging its own public key. After that, the paper proposed two new forward-secure multi-p...

2012
Ram Ratan Ahirwal Swarn Sanjay Sonwanshi

The User Authentication mechanism technology has enjoyed strong growth in recent year, but security threats and facing attacks in authentication have grown equally fast. Today, there are many potential attacks that are targeted at authentication including insider attack, masquerade attack, server spoofing attack, parallel session attack, offline password guessing attack and many more. Recently,...

Journal: :IACR Cryptology ePrint Archive 2015
Yandong Zheng Hua Guo

In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for resource-constrained wireless networks in Journal of Sensors (14(14):24358-24380, DOI: 10.3390/ s141224358). They asserted that their scheme 2 has the constant storage overhead, low communication overhead, and is secure, i.e., achieves mt-revocation capability, mt-wise forward secrecy, any-wise backward ...

2016
Marcus Seiler

[Context & motivation] Traceability of software engineering artifacts is important in software development. Tools are used to establish traceability between software engineering artifacts. [Problem] One of the open traceability challenges is the traceability-configuration during usage. At any time within a project, the traceability information model (TIM) should be adaptable to changing context...

2013
Masoumeh Taromirad Nicholas Drivalos Matragkas Richard F. Paige

Traceability is an important concern in projects that span different engineering domains. In such projects, traceability can be used across the engineering lifecycle and therefore is multi-domain, involving heterogeneous models. We introduce the concept and challenges of multidomain traceability and explain how it can be used to support traceability scenarios. We describe how to build a multi-d...

Journal: :CoRR 2017
Cas J. F. Cremers Lucca Hirschi

We advance the state-of-the-art in automated symbolic analysis for e-voting protocols by introducing three conditions that together are sufficient to guarantee ballot secrecy. There are two main advantages to using our conditions, compared to existing automated approaches. The first is a substantial expansion of the class of protocols and threat models that can be automatically analysed: we can...

2012
Chunguang Ma Ding Wang Ping Zhao Yu-Heng Wang

Forward secrecy is one of the important properties of remote user authentication schemes to limit the effects of eventual failure of the entire system when the long-term private keys of one or more parties are compromised. Recently, Tsai et al. showed that Wang et al.’s dynamic ID-based remote user authentication scheme fails to achieve user anonymity and is vulnerable to user impersonation att...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید