نتایج جستجو برای: compromising international security
تعداد نتایج: 487404 فیلتر نتایج به سال:
afghanistan as the largest producer of drug in the world, after the events of september 11, 2001, and attack of international forces following the resolution of the un, has been increasingly important in international politics. the range of effects from illigal drug trade in afghanistan and the countries on the way of transition and trafficking target market, has caused special attention paid t...
We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In ad...
Medical training devices are becoming increasingly dependent on technology, creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and the technical aspects involved with these breaches. This research examines the viability of breaching a production-deployed medical training mannequin. The re...
Joyce Jose, Josna Jose and M. Princy in their paper titled A Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks study wireless sensor networks (WSNs) aiming to increase lifetime of sensor nodes. Specifically, the authors concentrate on data aggregation as a security enhancement without compromising energy efficiency. In the paper they provide a study of differe...
Authentication is the first line of defense against compromising confidentiality and integrity. People can remember pictures better and for longer periods than alphanumeric passwords. All graphical passwords have two different aspects which are usability and security. Woefully none of these schemes were being able to fulfill both of these aspects at the same time. We analyze the known attack me...
The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the original data. Baek et al. noticed that the original notion of PEKS requires the existence of a secure channel, and they further extended this notion by proposing an efficient secure channel fr...
A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this project emphasizes lightweight software infrastructures that maintain minimal state, and interface to current and emerging distributed computing standards. Resource owners host a software backplane onto which owners, clients, or third-party r...
While passwords, by definition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As sharing passwords increases the chances of your passwords being compromised, leading websites like Google strongly advise their users not to share their passwords with anyone. To ca...
A Honeynet is a highly controlled network that interacts with attackers in cyber space to gather the attack data, to collect intelligence on attack techniques and behaviors of the black hat community. Other security devices like Firewalls, IDS etc are usually based on signatures and there has been large amount work done in the field of signature based detection. With the consideration of unknow...
We study the Sign then Encrypt, Commit then Encrypt and Sign, and Encrypt then Sign paradigms in the context of two cryptographic primitives, namely designated confirmer signatures and signcryption. Our study identifies weaknesses in those paradigms which impose the use of expensive encryption (as a building block) in order to meet a reasonable security level. Next, we propose some optimization...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید