نتایج جستجو برای: forward traceability attack
تعداد نتایج: 203777 فیلتر نتایج به سال:
Group signatures were introduced by Chaum and Van Heyst [12], and many security requirements for group signatures have been proposed. Bellare, Micciancio, and Warinschi [4] showed that satisfying full-anonymity and full-traceability is sufficient, in the sence that all the above-mentioned requirements are implied by them. Wilson and Menezes [5] introduced a considerable attack against standard ...
Food companies and governments in many countries are putting increasing emphasis on establishment of food traceability systems. Food traceability has become an effective way in food safety management. Aimed at food safety problems of cereal and oil products existing in the production, processing, warehousing, distribution and other links in the supply chain, this paper firstly proposes a new tr...
The quality safety traceability of meat food has played important role in governmental law, food industry management strategies, and consumers. Many institution and software companies have developed a lot of traceability system. There is a growing perception to implementation of reusability, multi resource data fusion and information sharing of the different system. The conceptual model is the ...
Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in various practical applications these days. Security analysis of the way these tags are used in an application is a must for successful adoption of the RFID technology. Depending on the requirements of the particular application, security demands on these tags cover some or all of the aspects such as privacy, ...
1 McArdle Laboratory for Cancer Research, University Of WisconsinMadison Medical School (KRH, ALV, GMZ, BJM, RST, CAB) 2 Department of Biostatistics and Medical Informatics, University of Wisconsin-Madison (MC) 3 Amersham Biosciences, Sunnyvale, CA (SJ, DR, SP) 4 Department of Pathology, Northwestern University, the Feinberg School of Medicine (JKR) 5 CIIT Centers for Health Research, Research ...
Mesures The accuracy of International Atomic Time TAI is based on a small number of primary frequency standards (PFS) that aim at realizing the SI second, the unit of proper time. Following the ldh meeting of the Consultative Committee for Time and Frequency (April 1999), the BIPM time section is reconsidering how the PFS comparisons are used for evaluating the duration of the scale unit of TAI...
Traceability links can provide essential support for evolutionary development of software, beyond requirements engineering e.g. for reuse & design decisions, design and code comprehension, effort estimation, checks for completeness and project management. For maximum support, traceability links are required not only for large grained artifacts but for fine grained ones as well. The establishmen...
Radio Frequency Identification (RFID) is a modern communication technology, which provides authentication and identification through a nonphysical contact. Recently, the use of this technology is almost developed in healthcare environments. Although RFID technology can prepare sagacity in systems, privacy and security issues ought to be considered before. Recently, in 2015, Li et al. proposed S...
There is a lack of work focusing on i* models pre-traceability. Most of traceability work on i* models is centered on forward or backward traceability, i.e., tracing i* models to design models or design models to i* models. It seems that the stakeholders' needs and the organizational process are first-class citizens, but the requirements engineering process is not. We present in this paper our ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید