نتایج جستجو برای: untraceability

تعداد نتایج: 141  

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

2015
Anna Krasnova Moritz Neikes Peter Schwabe

In many communication scenarios it is not sufficient to protect only the content of the communication, it is necessary to also protect the identity of communicating parties. Various protocols and technologies have been proposed to offer such protection, for example, anonymous proxies, mix-networks, or onion routing. The protocol that offers the strongest anonymity guarantees, namely uncondition...

Journal: :EURASIP J. Wireless Comm. and Networking 2011
Imran Erguler Emin Anarim Gökay Saldamli

In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and these responses are called side channels. In this respect, careless...

2003
Chih-Hung Wang

A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchants) exchange the electronic items (e.g. electronic money and goods) with each other in a fair manner that no one can gain advantage over the other even if there are malicious actions during exchanging process. In the p...

2007
Stefan Brands Liesje Demuynck Bart De Decker

We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case he or she abuses any one service. Our solution does not rely on key escrow: each user needs to trust only her own computing device with following our protocols in order to be assured of the unconditional untraceability and unlinkability of her pseudo...

2017
Yong-Yuan Deng Chin-Ling Chen Woei-Jiunn Tsaur Yung-Wen Tang Jung-Hsuan Chen

As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices ...

2006
Tony Liang Eng

In zero-knowledge proofs of knowledge, a single prover tries to convince a single verifier that he has possession of some knowledge s. The verifier accepts with probability 1 if the prover is honest (completeness), and rejects with high probability otherwise (soundness). In either case, the verifier learns nothing about s other than the bit of information as to whether or not the prover knows s...

2017
Véronique Cortier Antoine Dallon Stéphanie Delaune

Privacy-type properties such as vote secrecy, anonymity, or untraceability are typicallyexpressed using the notion of trace equivalence in a process algebra that models securityprotocols. In this paper, we propose some results to reduce the search space when we arelooking for an attack regarding trace equivalence. Our work is strongly inspired from [10],which establishes that, i...

2014
Foteini Baldimtsi

of “Efficient Cryptography for Information Privacy” by Foteini Baldimtsi, Ph.D., Brown University, May 2014. In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic transactions provide efficiency and convenience, they usually overlook the privacy of the users...

2014
Hannah Haynie Claire Bowern Patience Epps Jane Hill Patrick McConvell

Wanderwörter are a problematic set of words in historical linguistics. They usually make up a small proportion of the total vocabulary of individual languages, and only a minority of loanwords. They are, however, found frequently in languages from across the world. There is, to our knowledge, no general synthesis of Wanderwörter patterns, causes of exceptionally high borrowing rates for particu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید