نتایج جستجو برای: forward traceability attack
تعداد نتایج: 203777 فیلتر نتایج به سال:
In order to protect privacy of RFID tag against malicious tag tracing activities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in real network environments an adversary may easily interrupt or interfere transmission of necessary ...
The goal of white-box cryptography is to design implementations of common cryptographic algorithm (e.g. AES) that remain secure against an attacker with full control of the implementation and execution environment. This concept was put forward a decade ago by Chow et al. (SAC 2002) who proposed the first white-box implementation of AES. Since then, several works have been dedicated to the desig...
Complex, business critical software systems have to adapt to frequently changing needs. Evolutionary development processes have been developed to enable short responses to changes. In complex settings the changes bear high risks, such as incomplete implementation, misunderstood dependencies, missing comprehension and lacking coverage. To manage these risks, the concept of traceability has been ...
This study describes the development and the challenges in the development of an on-chip immunoassay for histamine using commercially available antibodies. Histamine can be used as an indicator of food freshness and quality, but it is also a relevant marker in clinical diagnostics. Due to its low molecular weight, simple structure and thus low immunogenicity production of high specificity and a...
Artifacts for requirements engineering, project management and code implementation are usually stored in separate tools, which makes traceability between these artifacts difficult. We developed the tool UNICASE Trace Client, which stores the aforementioned artifacts in a single environment with full traceability between all artifacts. In this paper, we describe the three traceability link creat...
Ad hoc networks are made of a group of portable terminals with wireless transmitter as multi-hops provisional autonomy system. Ad hoc networks are very easy to be attacked by various kinds of network attacks, as the limited resources, dynamic topology and open communication channel and so on. Wormhole attack is an internal attack means against routing protocols in the Ad hoc networks,The resear...
This article through the description cooking oil quality backward system setup procedure, proposed that in food tracing referral system's data acquisition and the polling message system establishment's essential factor, the implementation and the application, the system including the tracing database, the information acquisition, the network transmission and many kinds of inquiry terminals, int...
The support for traceability between requirement specifications has been recognised as an important task in the development life-cycle of software systems. In this paper we present an approach for automatic generation and maintenance of bi-directional traceability relations between commercial and functional requirements expressed in natural language, and requirement object models. The generatio...
Researchers and practitioners alike agree that software traceability is important to software development. Despite its recognized utility, software traceability has largely been infeasible in practice due to the high costs involved and the low benefits obtained. In the first part of this survey, we identify the difficulties that hinder end-to-end software traceability, and we analyze these diff...
Traceability is the ability of stakeholders to describe and follow the life of an artifact throughout the software development life cycle. Traceability is one of the most important quality attributes that are indicative of the maturity of software development organizations. While there has been extensive research focusing on the development of traceability models and support systems for differe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید