نتایج جستجو برای: the man
تعداد نتایج: 16069788 فیلتر نتایج به سال:
This paper considers the security issue of the fifth-generation (5G) wireless networks with massive connections, where multiple eavesdroppers aim to intercept the confidential messages through active eavesdropping. To realize secure massive access, non-orthogonal channel estimation (NOCE) and nonorthogonal multiple access (NOMA) techniques are combined to enhance the signal quality at legitimat...
Recent studies have shown that a significant number of mobile applications, often handling sensitive data such as bank accounts and login credentials, suffers from SSL vulnerabilities. Most of the time, these vulnerabilities are due to improper use of the SSL protocol (in particular, in its handshake phase), resulting in applications exposed to man-in-the-middle attacks. In this paper, we prese...
This paper provides a uniied and generalized treatment of information-theoretic lower bounds on an opponent's probability of cheating in one-way message authentication. It extends and generalizes, in a number of directions, the substantial body of known results, each of which holds only for a certain restricted scenario. At the same time the treatment of unconditionally-secure authentication is...
We present the design of a device for securing online transactions, e.g. for internet banking, which can protect against PC malware, including Man-in-the-Browser attacks. The device consists of a USBconnected smartcard reader with a small display and numeric keyboard, similar to devices currently used for internet banking. However, unlike existing devices, we rigorously stick to the design phil...
We deal with the distribution of N points placed consecutively around the circle by a fixed angle of α. From the proof of Tony van Ravenstein [RAV88], we propose a detailed proof of the Steinhaus conjecture whose result is the following: the N points partition the circle into gaps of at most three different lengths. We study the mathematical notions required for the proof of this theorem reveal...
Harnad (1994) identifies the symbol grounding problem as central to his distinction between cognition and computation. To Harnad computation is merely the systematically interpretable manipulation of symbols, while cognition requires that these symbols have intrinsic meaning that is acquired through transducers that mediate between a cogitator and the environment. We present a careful analysis ...
This paper presents the castle in Castlevania: Symphony of the Night as a structure that sets out a pattern of movement for the player-character that is similar to that experienced by the treader of a classical labyrinth. Specifically, this pattern is one of turning back on oneself and it always derives its meaning from the context in which it is performed. For example, the meaning of Theseus s...
In 2005, Wen et al. proposed the first provably secure three-party password-based authenticated key exchange using Weil pairings, and provided their proof in a modified Bellare-Rogaway model (BR-model). Here, we show an impersonation attack on Wen et al.’s scheme and point out a main flaw of their model that allows a man-in-the-middle adversary easily violate the security.
Conceptual Integrity has been claimed to be the essence of high-quality software system design. On the other hand, it has been a rather elusive attribute of software systems, challenging various attempts of a clear-cut characterization. This paper evolves in this direction by two means: first, by analysis and clarification of open issues in architecture and abstraction terms; second, by pointin...
Key issuing protocols deal with overcoming the two inherent problems: key escrow and secure channel requirement of the identity based cryptosystems. An efficient key issuing protocol enables the identity based cryptosystems to be more acceptable and applicable in the real world. We present a secure and efficient threshold key issuing protocol. In our protocol, neither KGC nor KPA can impersonat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید