نتایج جستجو برای: compromising international security

تعداد نتایج: 487404  

Journal: :پژوهشنامه ایرانی سیاست بین الملل 0
عنایت الله یزدانی مجتبی بدخشان

afghanistan as the largest producer of drug in the world, after the events of september 11, 2001, and attack of international forces following the resolution of the un, has been increasingly important in international politics. the range of effects from illigal drug trade in afghanistan and the countries on the way of transition and trafficking target market, has caused special attention paid t...

Journal: :Physical review letters 2007
Joseph M Renes Graeme Smith

We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In ad...

Journal: :CoRR 2015
Todd R. Andel Matt Campbell William Bradley Glisson Mike Jacobs Johnny Mayr Jeffrey Todd McDonald

Medical training devices are becoming increasingly dependent on technology, creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and the technical aspects involved with these breaches. This research examines the viability of breaching a production-deployed medical training mannequin. The re...

2014
Bhawna Mallick Deepak Garg

Joyce Jose, Josna Jose and M. Princy in their paper titled A Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks study wireless sensor networks (WSNs) aiming to increase lifetime of sensor nodes. Specifically, the authors concentrate on data aggregation as a security enhancement without compromising energy efficiency. In the paper they provide a study of differe...

2016
Pranita Binnar Vanita Mane

Authentication is the first line of defense against compromising confidentiality and integrity. People can remember pictures better and for longer periods than alphanumeric passwords. All graphical passwords have two different aspects which are usability and security. Woefully none of these schemes were being able to fulfill both of these aspects at the same time. We analyze the known attack me...

2009
Liming Fang Willy Susilo Chunpeng Ge Jiandong Wang

The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the original data. Baek et al. noticed that the original notion of PEKS requires the existence of a secure channel, and they further extended this notion by proposing an efficient secure channel fr...

2002
Vaidy S. Sunderam Dawid Kurzyniec

A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this project emphasizes lightweight software infrastructures that maintain minimal state, and interface to current and emerging distributed computing standards. Resource owners host a software backplane onto which owners, clients, or third-party r...

Journal: :CoRR 2013
Prateek Dewan Mayank Gupta Ponnurangam Kumaraguru

While passwords, by definition, are meant to be secret, recent trends in the Internet usage have witnessed an increasing number of people sharing their email passwords for both personal and professional purposes. As sharing passwords increases the chances of your passwords being compromised, leading websites like Google strongly advise their users not to share their passwords with anyone. To ca...

2014
Amit Chaudhary Heena Goyal

A Honeynet is a highly controlled network that interacts with attackers in cyber space to gather the attack data, to collect intelligence on attack techniques and behaviors of the black hat community. Other security devices like Firewalls, IDS etc are usually based on signatures and there has been large amount work done in the field of signature based detection. With the consideration of unknow...

Journal: :IACR Cryptology ePrint Archive 2012
Laila El Aimani

We study the Sign then Encrypt, Commit then Encrypt and Sign, and Encrypt then Sign paradigms in the context of two cryptographic primitives, namely designated confirmer signatures and signcryption. Our study identifies weaknesses in those paradigms which impose the use of expensive encryption (as a building block) in order to meet a reasonable security level. Next, we propose some optimization...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید