نتایج جستجو برای: 9 weaknesses

تعداد نتایج: 503181  

Journal: :Contemporary Management Research 2010

2012
Hyung-Kyu Yang Young-Hwa An

Abstract Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2006, Khan et al.[12] proposed an improved fingerprint-based remote user authentication scheme using smart cards that is achieved mutual authentication between the user and the server, while eliminating the drawback of Lee...

2010
Pouyan Sepehrdad Serge Vaudenay Martin Vuagnoux

In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known KSA weaknesses to provide practical key recovery attacks. Henceforth, we apply a similar technique on RC4 a...

Journal: :Applied Economics and Finance 2018

Journal: :Applied sciences 2022

Randomness testing is a key tool to analyse the quality of true (physical) random and pseudo-random number generators. There wide variety tests that are designed for this purpose, i.e., goodness sequences used. These grouped in different sets called suites or batteries. The batteries must be such way form them independent, they have coverage, computationally efficient. One battery well-known EN...

2001
Markus Jakobsson Susanne Wetzel

We point to three types of potential vulnerabilities in the Bluetooth standard, version 1.0B. The first vulnerability opens up the system to an attack in which an adversary under certain circumstances is able to determine the key exchanged by two victim devices, making eavesdropping and impersonation possible. This can be done either by exhaustively searching all possible PINs (but without inte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید