نتایج جستجو برای: authorized exploiters
تعداد نتایج: 6369 فیلتر نتایج به سال:
which efficiently combines a multi-proxy multi-signature scheme with a signcryption, is proposed. Its security is analyzed in detail. In our scheme, a proxy signcrypter group could be authorized as a proxy agent by the cooperation of all members in the original signcrypter group. Then the proxy signcryptions can be generated by the cooperation of all the signcrypters in the authorized proxy sig...
Within the next few decades, several hundred thousand tons of metal are expected to be removed from nuclear facilities across the U.S. Department of Energy (DOE) complex as a result of decontamination and decommissioning (D&D) activities. These materials, together with large quantities of tools, equipment, and other items that are commonly recovered from site cleanup or D&D activities, constitu...
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define formal tools in order to distinguish between authorized, or declared, information flows such as password testing (e.g., ATM, login processes, etc.) and non-authorized ones. We propose to define security policies as rewriting systems. Such policies define how the privac...
This paper presents an approach enabling a smart card is suer to verify that a new applet securely interacts with already down loaded applets A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels We propose a technique based on model checking to verify that actual information ows between applets are authorized We illus...
Safe injection facilities (SIFs) have shown promise in reducing harms and social costs associated with injection drug use. Favorable evaluations elsewhere have raised the issue of their implementation in the United States. Recognizing that laws shape health interventions targeting drug users, we analyzed the legal environment for publicly authorized SIFs in the United States. Although states an...
A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of part...
We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broadcast encryption systems by enabling the identification of authorized users known as traitors that contribute to unauthorized pirate decoders. In the proposed scheme, upon the confiscation of a pirate decoder created by a collu...
This work describes schemes for distributing between n servers the evaluation of a function f which is an approximation to a random function, such that only authorized subsets of servers are able to compute the function. A user who wants to compute f(x) should send x to the members of an authorized subset and receive information which enables him to compute f(x). We require that such a scheme i...
Protecting sensitive data is no longer a problem restricted to governments whose national security is at stake. With ubiquitous Internet connectivity, it is challenging to secure a network – not only to prevent attack, but also to ensure that sensitive data are not released. In this paper, we consider the problem of ensuring that only pre-authorized data leave a network boundary using either ov...
Diverting large quantities of goods from authorized distribution channels to unauthorized or “gray market” channels, albeit legal, significantly affects both firms and consumers due to effects on price, revenue, service and warranty availability, and product availability. In this paper we consider mechanisms by which the uncertainty surrounding inventory ordering decisions drives gray markets. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید