نتایج جستجو برای: traceability attack

تعداد نتایج: 86939  

2016
Priyanka Pandey Chandresh D. Parekh

RFID system is one of the fastest growing technologies among the automation applications needed in Organizations, Institution, and Supply Chain Management etc. Along with non-line of sight capability, RFID tag’s capability of durability, reusability, data encryption, increased storage and faster read rate etc. makes RFID systems much efficient, faster and robust than other existing systems such...

Journal: :Automatic Control and Computer Sciences 2021

Traceability schemes that are applied to broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme, distributor broadcasts encrypted data and gives each authorized user unique key identifying word selected error-correcting code for decrypting. The following attack is possible in these schemes: groups of c malicious users join into coalit...

Journal: :Designs, Codes and Cryptography 2022

Abstract In this paper we consider complete traceability multimedia fingerprinting codes resistant to averaging attacks and adversarial noise. Recently it was shown that there are no such for the case of an arbitrary linear attack. However, exponential cardinality constant noise were constructed in Egorova et al. (Probl Inf Transm 56(4):388–398, 2020). We continue work provide improved lower bo...

2007
Mikaël Barbero Marcos Didonet Del Fabro Jean Bézivin

Establishing and using traceability and provenance between different models is a very important issue in complex software systems. Traceability in the small (local traceability) handles the trace information between model elements. Traceability in the large (global traceability) handles traceability information between models as a whole. Current solutions are more or less adhoc approaches that ...

Journal: :CoRR 2008
Julio César Hernández Castro Juan E. Tapiador Pedro Peris-Lopez Jean-Jacques Quisquater

In this work we present the first passive attack over the SASI lightweight authentication protocol with modular rotations. This can be used to fully recover the secret ID of the RFID tag, which is the value the protocol is designed to conceal. The attack is described initially for recovering blog2(96)c = 6 bits of the secret value ID, a result that by itself allows to mount traceability attacks...

Journal: :IACR Cryptology ePrint Archive 2017
Jun Liu Yupu Hu

Digital rights management is an important technique to protect digital contents from abuse. Usually it is confronted with severe challenges because of the untrusted environment its application executed in. This condition is formally described as white-box attack model. White-box cryptography aims at protecting software implementation of cryptographic algorithms from white-box attack, hence can ...

Journal: :I. J. Network Security 2014
Walid I. Khedr

RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications, different authentication schemes have been proposed to ...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Majid Naderi

In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...

Journal: :JoWUA 2013
Jian Xu Yuxi Li Jingwei Miao Fucai Zhou

Due to the increasingly serious information attacks in network times, the electronic commerce is facing additional challenges in the aspects of security and efficiency. Therefore, in this paper, we propose a new practical e-cash protocol based on dynamic group signature in BSZ model, using the NonInteractive Zero-Knowledge proofs system. And it is proved that our protocol satisfies anonymity wh...

Journal: :J. Comput. Syst. Sci. 2014
Kaiping Xue Peilin Hong Changsha Ma

Traditional password based authentication schemes are mostly considered in single server environments. They are unfitted for the multi-server environments from two aspects. On the one hand, users need to register in each server and to store large sets of data, including identities and passwords. On the other hand, servers are required to store a verification table containing user identities and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید