نتایج جستجو برای: desynchronization attack
تعداد نتایج: 82948 فیلتر نتایج به سال:
In order to protect privacy of RFID tag against malicious tag tracing activities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in real network environments an adversary may easily interrupt or interfere transmission of necessary ...
Machine-to-machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. Many are connected perform task automatically in machine-to-machine communication, but they not properly secured, allowing an adversary compromise them against variety atta...
Brain Computer Interfaces (BCI) can be used for therapeutic purposes to improve voluntary motor control that has been affected post stroke. For this purpose, desynchronization of sensorimotor rhythms of the electroencephalographic signal (EEG) can be used. But it is necessary to study what happens in the affected motor cortex of this people. In this article, we analyse EEG recordings of hemiple...
This paper thoroughly investigates the advantages and disadvantages of desynchronization. It also describes practical considerations that should be taken into account during the process of desynchronization of any ordinary clocked system. MiniMIPS is being desynchronized as a case study. The handshake protocol used in desynchronization, namely, Bundled4-Cycle-Late-Data protocol, is also introdu...
EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this standard, several protocols have been proposed compliant to this standard. In this paper we analyze the improved Yeh et al. ’s protocol by Yoon which is conforming to EPC-C1 G2 standard and is one ...
In the field of side-channel analysis, profiled attacks are one most powerful types attacks. Nevertheless, major issues with in sensitivity to noise and high-dimensional nature signals used for training, generating a less efficient classifier conduct attack phase. Consequently, evaluating security cryptographic implementation hardware devices like IoT becomes more complex as analysis evaluation...
Desynchronization is one of the primitive services for complex networks because it arranges nodes to take turns accessing a shared resource. TDMA is a practical application of desynchronization because it allows node to share a common medium. In this paper, we propose a novel desynchronization algorithm using artificial force field called Multi-hop Desynchronization With an ARtificial Force fie...
By spreading phases on the unit circle, desynchronization algorithm is a powerful tool to achieve round-robin scheduling, which is crucial in applications as diverse as media access control of communication networks, realization of analogto-digital converters, and scheduling of traffic flows in intersections. Driven by the increased application of pulse-coupled oscillators in achieving synchron...
Desynchronization vulnerabilities have limited audio watermarking’s success in applications such as digital rights management (DRM). Our work extends (blind-detection) spread spectrum (SS) watermarking to withstand time scale desynchronization (insertion/deletions) by applying dynamic programming (DP). Detection uses short SS watermark blocks with a novel O(N logN) correlation algorithm that pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید