نتایج جستجو برای: untraceability

تعداد نتایج: 141  

Journal: :Wireless Personal Communications 2010
Imran Erguler Emin Anarim

Many RFID authentication protocols have been proposed to preserve security and privacy. Nevertheless, most of these protocols are analyzed and it is shown that they can not provide security against some RFID attacks. Moreover, some of the secure ones are criticized, because they suffer from scalability at the reader/server side as in tag identification or authentication phase they require a lin...

1993
Stefan Brands

Incorporating the property of untraceability of payments into oo-line electronic cash systems has turned out to be no easy matter. Two key concepts have been proposed in order to attain the same level of security against double-spending as can be trivially attained in systems with full traceability of payments. The rst of these, one-show blind signatures, ensures traceability of double-spenders...

2014
Rémy Chrétien Véronique Cortier Stéphanie Delaune

Privacy properties such as untraceability, vote secrecy, or anonymity are typically expressed asbehavioural equivalence in a process algebra that models security protocols. In this paper, we study how todecide one particular relation, namely trace equivalence, for an unbounded number of sessions.Our first main contribution is to reduce the search space for attacks. Specifically, we ...

2017
Jessica Su Ansh Shukla Sharad Goel Arvind Narayanan

Can online trackers and network adversaries de-anonymize web browsing data readily available to them? We show— theoretically, via simulation, and through experiments on real user data—that de-identified web browsing histories can be linked to social media profiles using only publicly available data. Our approach is based on a simple observation: each person has a distinctive social network, and...

2013
M. Uma Devi

Data is one of the most important resources to organization and any loss or lack of access could lead to many problems, so the data should be transmitted with security. Although encryption was used to hide the contents of transmitted data, it does not hide the identity of the communicating parties and it does not prevent traffic analysis.Anonymity in a communication context, also known as untra...

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

2010
Karim El Defrawy

OF THE DISSERTATION Security and Privacy in Location-Based Mobile Ad-Hoc Networks By Karim El Defrawy Doctor of Philosophy in Networked Systems University of California, Irvine, 2010 Professor Gene Tsudik, Chair In the last two decades, research in various aspects of mobile ad-hoc networks, MANETs, has been very active, motivated mainly by military, disaster relief and law enforcement scenarios...

2004
Todd Davies

for SSCW-2004 March 14, 2004 Secret ballots were introduced for public elections in Australia, followed by the U.S., in the latter half of the 19 Century. The ostensible reason for their introduction was to prevent coercion by employers and political parties, who often controlled the printing and distribution of ballots and could thus prevent their supporters from deviating from the “party line...

Journal: :IJARAS 2013
Andreu Pere Isern-Deyà Magdalena Payeras-Capellà Macià Mut Puigserver Josep Lluís Ferrer-Gomila

The development of new applications of electronic commerce (e-commerce) that require the payment of small amounts of money to purchase services or goods opens new challenges in the security and privacy fields. These payments are called micropayments and they provide a trade-off between efficiency and security requirements to pay low-value items. It is usual to assume low value fraud to achieve ...

Journal: :EURASIP J. Wireless Comm. and Networking 2014
Damien Sauveron Konstantinos Markantonakis Christos V. Verikoukis

Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. In this context, it is widely argued that security has become a primary concern, in order to ensure dependable, secure communications and services to the end user. There are many open questions for these challenging...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید