نتایج جستجو برای: keychain

تعداد نتایج: 35  

Journal: :Electr. Notes Theor. Comput. Sci. 2011
Zhiyuan Liu Jun Pang Chenyi Zhang

In certified email (CEM) protocols, TTP transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy. Recently we have extended the CEM protocol of Cederquist et al. to satisfy TTP transparency. As a continuation, in this paper, we formally verify the security requirement in the exteded protocol. The properties of fairness,...

2006
Gary M. Gaukler Ralf W. Seifert

In this chapter we first give an introduction to radio-frequency identification (RFID) technology. We discuss capabilities and limitations of this technology in a supply chain setting. We then present several current applications of this technology to supply chains to demonstrate best practices and important implementation considerations. Subsequently, we discuss several issues that may hinder ...

2017
Gunnar Wolf Víctor González Quiroga

The Debian project is one of the largest free software undertakings worldwide. It is geographically distributed, and participation in the project is done on a voluntary basis, without a single formal employee or directly funded person. As we will explain, due to the nature of the project, its authentication needs are very strict—User/password schemes are way surpassed, and centralized trust man...

2003
Donggang Liu Peng Ning

Broadcast authentication is a fundamental security service in distributed sensor networks. A scheme named μTESLA has been proposed for efficient broadcast authentication in such networks. However, μTESLA requires initial distribution of certain information based on unicast between the base station and each sensor node before the actual authentication of broadcast messages. Due to the limited ba...

2012
Jianmin Zhang Li Li

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows a sender to broadcast messages to multiple nodes in an authenticated way. Symmetric key based schemes such as μTESLA and μTESLA-like schemes have been proposed to provide such services for WSNs, however, the life-time of these schemes is constrained by the length of the key chains. To addres...

In this paper we enumerate fuzzy subgroups, up to a natural equivalence, of some finite abelian p-groups of rank two where p is any prime number. After obtaining the number of maximal chains of subgroups, we count fuzzy subgroups using inductive arguments. The number of such fuzzy subgroups forms a polynomial in p with pleasing combinatorial coefficients. By exploiting the order, we label the s...

Journal: :Jurnal Pengabdian Pada Masyarakat 2023

Pada jenjang pendidikan anak usia dini (PAUD), media pembelajaran merupakan hal yang sangat penting bagi guru dalam melaksanakan proses pembelajaran. Salah satu jenis sesuai dengan karakteristik PAUD adalah menggambar atau mewarnai. Berangkat dari pemahaman tersebut, program pengabdian masyarakat (PkM) ini bekerjasama Taman Kanak-kanak Islamic Kids Corner (IKC) Bogor melakukan analisis kebutuha...

Journal: :CoRR 2015
Luyi Xing Xiaolong Bai Tongxin Li XiaoFeng Wang Kai Chen Xiaojing Liao Shi-Min Hu Xinhui Han

On modern operating systems, applications under the same user are separated from each other, for the purpose of protecting them against malware and compromised programs. Given the complexity of today’s OSes, less clear is whether such isolation is effective against different kind of cross-app resource access attacks (called XARA in our research). To better understand the problem, on the less-st...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید