نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

Journal: :Informatica, Lith. Acad. Sci. 2003
Bin-Tsan Hsieh Hung-Min Sun Tzonelih Hwang

In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authentication protocol. User authentication via user memorable password provides convenience without needing any auxiliary devices, such as smart card. A user authentication protocol via username and password should b...

Journal: :CoRR 2010
Yalin Chen Jue-Sam Chou Chun-Hui Huang

In this paper, we analyze four authentication protocols of Bindu et al., Goriparthi et al., Wang et al. and Holbl et al.. After investigation, we reveal several weaknesses of these schemes. First, Bindu et al.¡s protocol suffers from an insider impersonation attack if a malicious user obtains a lost smart card. Second, both Goriparthi et al.¡s and Wang et al.¡s protocols cannot withstand a DoS ...

2013
Ruhul Amin Jakir Hossain

Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types...

1998
Martin Steppler

This paper rst presents the SDL{oriented method of software design and then points out how to handle the non{functional, quantitative design of an SDL{system using performance analysis. Finally, a new tool, named SDL Performance Evaluation Tool (SPEET) 2 , is presented for the performance analysis of formally speciied systems under real{time conditions. SPEET facilitates the simulation and emul...

1999
Paul J. Drongowski David Hunter Morteza Fayyazi David Kaeli Jason Casmira

For an emulation/translation environment to attract a signi cant user base, the environment must provide reliable and e cient application execution. The issues of correctness and performance are fundamental to this environment, yet many times these goals are in con ict. While maintaining correctness is not optional, optimal performance is di cult to always achieve. In order to detect and remedy...

Journal: :Computer Networks and ISDN Systems 1995
Louis Perrochon Roman Fischer

This paper focuses on the problem of accessing interactive information servers ("interactive sessions" in W3-terminology, e.g. an existing library information system) directly with a W3-browser instead of opening an additional viewer (e.g. a terminal emulation program). IDLE is a language designed to describe the user interface of interactive information servers in a way that allows automatic t...

2016
Adnaan Ahmad Vijay Joshi R. Chen J. -M. Park J. H. Reed C. H. Chin J. G. Kim D. Lee

The traditional spectrum management techniques allow most of the spectrum to be used by licensed users exclusively. Spectrum sharing mechanism in Cognitive Radio Networks allows spectrum access to secondary user in addition to the primary licensed user. The Secondary Users, in order to compete for the spectrum, turn malicious and try to occupy all or a part of the available channel leading to S...

2013
Rakesh Pandit

Password based authentication faces security related threats from phishing, server compromise and man-inthe-middle attack. Despite the poor security, it has been the primary method of user authentication on web since a decade now. This paper is a systematic review of a proposal, by Czeskis et al., which aims to provide opportunistic protected login for user authentication, for web services with...

2002
Christopher Barnes Plamen V. Petrov Linda R. Elliott

This paper describes approach, methodology, and potential application areas for agent technologies in C2 performance and primarily focuses on the development of agent-based constructed forces. The platform involved is the AWACS-AEDGETM. This is a distributed, realtime team decision support environment comprised of simulators, entity framework, intelligent agents and user interfaces. The AEDGE i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید