نتایج جستجو برای: 13 weaknesses
تعداد نتایج: 352698 فیلتر نتایج به سال:
Abstract Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2006, Khan et al.[12] proposed an improved fingerprint-based remote user authentication scheme using smart cards that is achieved mutual authentication between the user and the server, while eliminating the drawback of Lee...
We show two weaknesses in the the authentication functionality of GCM when it is used with a short authentication tag. The first weakness raises the probability of a successful forgery significantly. The second weakness reveals the authentication key if the attacker manages to create successful forgeries.
There is considerable enthusiasm about Case-Based Reasoning as a means of developing knowledge-based systems. There are two broad reasons for this enthusiasm. First, it is evident that much of human expert competence is experience based and it makes sense to adopt a reuse-based methodology for developing knowledge based systems. The other reason is the expectation that using Case-Based Reasonin...
This paper proposes a heterogeneous multi-core architecture where all of the cores share a single Instruction Set Architecture (ISA). The design is characterized by each of the heterogeneous cores representing a different point in the power/performance design space. They demonstrate, through modeling, that this is an effective mechanism to reduce power dissipation by means of dynamically switch...
This paper analyzes the ASPIC+ argumentation system. It shows that it is grounded on two monotonic logics which are not Tarskian ones. Moreover, the system suffers from five main problems: i) its logical formalism is ill-defined, ii) it may return undesirable results, iii) it builds on some counter-intuitive assumptions, iv) it violates some rationality postulates, and v) it allows counterintui...
Model-based steganography is a promising approach for hidden communication in JPEG images with high steganographic capacity and competitive security. In this paper we propose an attack, which is based on coefficient types that can be derived from the blockiness adjustment of MB2. We derive 30 new features to be used in combination with existing blind feature sets leading to a remarkable reducti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید