نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

2011
Kuo-Hui Yeh Nai-Wei Lo Yingjiu Li Yung-Chun Chen Tzong-Chen Wu

In order to protect privacy of RFID tag against malicious tag tracing activities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in real network environments an adversary may easily interrupt or interfere transmission of necessary ...

Journal: :IACR Cryptology ePrint Archive 2013
Tancrède Lepoint Matthieu Rivain

The goal of white-box cryptography is to design implementations of common cryptographic algorithm (e.g. AES) that remain secure against an attacker with full control of the implementation and execution environment. This concept was put forward a decade ago by Chow et al. (SAC 2002) who proposed the first white-box implementation of AES. Since then, several works have been dedicated to the desig...

2007
Patrick Maeder Ilka Philippow Matthias Riebisch

Complex, business critical software systems have to adapt to frequently changing needs. Evolutionary development processes have been developed to enable short responses to changes. In complex settings the changes bear high risks, such as incomplete implementation, misunderstood dependencies, missing comprehension and lacking coverage. To manage these risks, the concept of traceability has been ...

2017
Leena Mattsson Claudia Preininger

This study describes the development and the challenges in the development of an on-chip immunoassay for histamine using commercially available antibodies. Histamine can be used as an indicator of food freshness and quality, but it is also a relevant marker in clinical diagnostics. Due to its low molecular weight, simple structure and thus low immunogenicity production of high specificity and a...

2013
Alexander Delater Barbara Paech

Artifacts for requirements engineering, project management and code implementation are usually stored in separate tools, which makes traceability between these artifacts difficult. We developed the tool UNICASE Trace Client, which stores the aforementioned artifacts in a single environment with full traceability between all artifacts. In this paper, we describe the three traceability link creat...

2013
Huang Wen

Ad hoc networks are made of a group of portable terminals with wireless transmitter as multi-hops provisional autonomy system. Ad hoc networks are very easy to be attacked by various kinds of network attacks, as the limited resources, dynamic topology and open communication channel and so on. Wormhole attack is an internal attack means against routing protocols in the Ad hoc networks,The resear...

2015
Rui-ying Zheng Yan-jie Zhou

This article through the description cooking oil quality backward system setup procedure, proposed that in food tracing referral system's data acquisition and the polling message system establishment's essential factor, the implementation and the application, the system including the tracing database, the information acquisition, the network transmission and many kinds of inquiry terminals, int...

2003
Andrea Zisman George Spanoudakis Elena Pérez-Miñana Paul Krause

The support for traceability between requirement specifications has been recognised as an important task in the development life-cycle of software systems. In this paper we present an approach for automatic generation and maintenance of bi-directional traceability relations between commercial and functional requirements expressed in natural language, and requirement object models. The generatio...

2007
Hazeline Asuncion Richard N. Taylor

Researchers and practitioners alike agree that software traceability is important to software development. Despite its recognized utility, software traceability has largely been infeasible in practice due to the high costs involved and the low benefits obtained. In the first part of this survey, we identify the difficulties that hinder end-to-end software traceability, and we analyze these diff...

2004
Kannan Mohan Nanda Kumar

Traceability is the ability of stakeholders to describe and follow the life of an artifact throughout the software development life cycle. Traceability is one of the most important quality attributes that are indicative of the maturity of software development organizations. While there has been extensive research focusing on the development of traceability models and support systems for differe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید