نتایج جستجو برای: primary user emulation attack
تعداد نتایج: 950393 فیلتر نتایج به سال:
In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authentication protocol. User authentication via user memorable password provides convenience without needing any auxiliary devices, such as smart card. A user authentication protocol via username and password should b...
In this paper, we analyze four authentication protocols of Bindu et al., Goriparthi et al., Wang et al. and Holbl et al.. After investigation, we reveal several weaknesses of these schemes. First, Bindu et al.¡s protocol suffers from an insider impersonation attack if a malicious user obtains a lost smart card. Second, both Goriparthi et al.¡s and Wang et al.¡s protocols cannot withstand a DoS ...
Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types...
This paper rst presents the SDL{oriented method of software design and then points out how to handle the non{functional, quantitative design of an SDL{system using performance analysis. Finally, a new tool, named SDL Performance Evaluation Tool (SPEET) 2 , is presented for the performance analysis of formally speciied systems under real{time conditions. SPEET facilitates the simulation and emul...
For an emulation/translation environment to attract a signi cant user base, the environment must provide reliable and e cient application execution. The issues of correctness and performance are fundamental to this environment, yet many times these goals are in con ict. While maintaining correctness is not optional, optimal performance is di cult to always achieve. In order to detect and remedy...
This paper focuses on the problem of accessing interactive information servers ("interactive sessions" in W3-terminology, e.g. an existing library information system) directly with a W3-browser instead of opening an additional viewer (e.g. a terminal emulation program). IDLE is a language designed to describe the user interface of interactive information servers in a way that allows automatic t...
The traditional spectrum management techniques allow most of the spectrum to be used by licensed users exclusively. Spectrum sharing mechanism in Cognitive Radio Networks allows spectrum access to secondary user in addition to the primary licensed user. The Secondary Users, in order to compete for the spectrum, turn malicious and try to occupy all or a part of the available channel leading to S...
Password based authentication faces security related threats from phishing, server compromise and man-inthe-middle attack. Despite the poor security, it has been the primary method of user authentication on web since a decade now. This paper is a systematic review of a proposal, by Czeskis et al., which aims to provide opportunistic protected login for user authentication, for web services with...
Agent-based Simulation and Support of C3 Decisionmaking Using a Command and Control Research Network
This paper describes approach, methodology, and potential application areas for agent technologies in C2 performance and primarily focuses on the development of agent-based constructed forces. The platform involved is the AWACS-AEDGETM. This is a distributed, realtime team decision support environment comprised of simulators, entity framework, intelligent agents and user interfaces. The AEDGE i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید