نتایج جستجو برای: keychain
تعداد نتایج: 35 فیلتر نتایج به سال:
In certified email (CEM) protocols, TTP transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy. Recently we have extended the CEM protocol of Cederquist et al. to satisfy TTP transparency. As a continuation, in this paper, we formally verify the security requirement in the exteded protocol. The properties of fairness,...
In this chapter we first give an introduction to radio-frequency identification (RFID) technology. We discuss capabilities and limitations of this technology in a supply chain setting. We then present several current applications of this technology to supply chains to demonstrate best practices and important implementation considerations. Subsequently, we discuss several issues that may hinder ...
The Debian project is one of the largest free software undertakings worldwide. It is geographically distributed, and participation in the project is done on a voluntary basis, without a single formal employee or directly funded person. As we will explain, due to the nature of the project, its authentication needs are very strict—User/password schemes are way surpassed, and centralized trust man...
Broadcast authentication is a fundamental security service in distributed sensor networks. A scheme named μTESLA has been proposed for efficient broadcast authentication in such networks. However, μTESLA requires initial distribution of certain information based on unicast between the base station and each sensor node before the actual authentication of broadcast messages. Due to the limited ba...
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows a sender to broadcast messages to multiple nodes in an authenticated way. Symmetric key based schemes such as μTESLA and μTESLA-like schemes have been proposed to provide such services for WSNs, however, the life-time of these schemes is constrained by the length of the key chains. To addres...
In this paper we enumerate fuzzy subgroups, up to a natural equivalence, of some finite abelian p-groups of rank two where p is any prime number. After obtaining the number of maximal chains of subgroups, we count fuzzy subgroups using inductive arguments. The number of such fuzzy subgroups forms a polynomial in p with pleasing combinatorial coefficients. By exploiting the order, we label the s...
Pada jenjang pendidikan anak usia dini (PAUD), media pembelajaran merupakan hal yang sangat penting bagi guru dalam melaksanakan proses pembelajaran. Salah satu jenis sesuai dengan karakteristik PAUD adalah menggambar atau mewarnai. Berangkat dari pemahaman tersebut, program pengabdian masyarakat (PkM) ini bekerjasama Taman Kanak-kanak Islamic Kids Corner (IKC) Bogor melakukan analisis kebutuha...
On modern operating systems, applications under the same user are separated from each other, for the purpose of protecting them against malware and compromised programs. Given the complexity of today’s OSes, less clear is whether such isolation is effective against different kind of cross-app resource access attacks (called XARA in our research). To better understand the problem, on the less-st...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید