نتایج جستجو برای: traceability attack
تعداد نتایج: 86939 فیلتر نتایج به سال:
RFID system is one of the fastest growing technologies among the automation applications needed in Organizations, Institution, and Supply Chain Management etc. Along with non-line of sight capability, RFID tag’s capability of durability, reusability, data encryption, increased storage and faster read rate etc. makes RFID systems much efficient, faster and robust than other existing systems such...
Traceability schemes that are applied to broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme, distributor broadcasts encrypted data and gives each authorized user unique key identifying word selected error-correcting code for decrypting. The following attack is possible in these schemes: groups of c malicious users join into coalit...
Abstract In this paper we consider complete traceability multimedia fingerprinting codes resistant to averaging attacks and adversarial noise. Recently it was shown that there are no such for the case of an arbitrary linear attack. However, exponential cardinality constant noise were constructed in Egorova et al. (Probl Inf Transm 56(4):388–398, 2020). We continue work provide improved lower bo...
Establishing and using traceability and provenance between different models is a very important issue in complex software systems. Traceability in the small (local traceability) handles the trace information between model elements. Traceability in the large (global traceability) handles traceability information between models as a whole. Current solutions are more or less adhoc approaches that ...
In this work we present the first passive attack over the SASI lightweight authentication protocol with modular rotations. This can be used to fully recover the secret ID of the RFID tag, which is the value the protocol is designed to conceal. The attack is described initially for recovering blog2(96)c = 6 bits of the secret value ID, a result that by itself allows to mount traceability attacks...
Digital rights management is an important technique to protect digital contents from abuse. Usually it is confronted with severe challenges because of the untrusted environment its application executed in. This condition is formally described as white-box attack model. White-box cryptography aims at protecting software implementation of cryptographic algorithms from white-box attack, hence can ...
RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications, different authentication schemes have been proposed to ...
In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...
Due to the increasingly serious information attacks in network times, the electronic commerce is facing additional challenges in the aspects of security and efficiency. Therefore, in this paper, we propose a new practical e-cash protocol based on dynamic group signature in BSZ model, using the NonInteractive Zero-Knowledge proofs system. And it is proved that our protocol satisfies anonymity wh...
Traditional password based authentication schemes are mostly considered in single server environments. They are unfitted for the multi-server environments from two aspects. On the one hand, users need to register in each server and to store large sets of data, including identities and passwords. On the other hand, servers are required to store a verification table containing user identities and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید