نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

2012
Eun-Jun Yoon

In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers’ attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper demonstrates that He et al.’s scheme has some drawbacks: poor reparability problem, user impersonation...

Journal: :IACR Cryptology ePrint Archive 2015
Sonam Devgan Kaul Amit K. Awasthi

In 2012, Wen and Li proposed a secure and robust dynamic identity based remote user authentication scheme with key agreement using smart cards. They claimed that their scheme is efficient and secure. But in this paper, we demonstrate that their scheme is completely insecure and vulnerable to various known attacks like offline and online password guessing attack, impersonation attack, server mas...

Journal: :J. Inf. Sci. Eng. 2015
Kuo-Yang Wu Kuo-Yu Tsai Tzong-Chen Wu Kouichi Sakurai

This paper presents an anonymous authentication scheme for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity information of the mobile user who is sending the roaming request. In addition, the home agent does not have to maintain any verification table for authenticating the mobile user. We give formal analyses to show that our proposed scheme sa...

2002
Thomas Rist Markus Schmitt

The Avatar Arena is a test-bed for the simulation of multi-character negotiation dialogues. Unlike other approaches to agent-agent negotiation processes in multi agent systems, the primary focus of our work is neither on negotiation protocols nor on optimisation issues. Rather, we are interested in the emulation of negotiation dialogues between affective characters that are embedded in a certai...

2013
Tien-Ho Chen Hsiu-lien Yeh Tseng-Yi Chen Wei-Kuan Shih

Remote user authentication is a very important ingredient procedure for the network system service to authenticate whether a remote user is legal through any insecure channel. Recently, Hsiang-Shih proposed a dynamic ID based remote user authentication scheme for multi-server environment as an improved scheme over Liao and Wang’s scheme, and asserted that their scheme can escape from masquerade...

2007
William Healey Karthik Pattabiraman Shane Ryoo Ravi Iyer Wen-Mei Hwu

Memory-based attacks represent one of the largest attack classes in the field. Many techniques have been proposed to protect applications from certain classes of memory exploits, however, few of these techniques can protect the application from all memory attacks, and few permit the protection of only select variables. We present a technique to provide protection of select variables from a wide...

2012
Younghwa An

Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication sc...

Journal: :International Journal For Multidisciplinary Research 2023

Malware detection plays a crucial role in cyber-security with the increase malware growth and advancements cyber-attacks. Malicious software applications, or malware, are primary source of many security problems. These intentionally manipulative malicious applications intend to perform unauthorized activities on behalf their originators host machines for various reasons such as stealing advance...

1999
Carl D'Halluin Gert Bijnens Vincent Rijmen Bart Preneel

In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Crypton and prove that the entire 256-bit user key for 6 rounds of Crypton can be recovered with a complexity of 2 encryptions, whereas for Square 2 encryptions are required to recover the 128-bit user key.

Journal: :Symmetry 2022

The Internet of Vehicles (IoV) is witnessed to play the leading role in future Intelligent Transportation Systems (ITS). Though many works have focused on IoV improvement, there still a lack performance due insufficient spectrum availability, lower data rates, and involvement attackers. This paper considers all three issues by developing novel mmWave-assisted Cognitive Radio based (CR-IoV) mode...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید