نتایج جستجو برای: ban logic

تعداد نتایج: 157888  

2014
Takashi Kameda Ken Takahashi Rokho Kim Ying Jiang Mehrnoosh Movahed Eun-Kee Park Jorma Rantanen

OBJECTIVE To analyse national data on asbestos use and related diseases in the European Region of the World Health Organization (WHO). METHODS For each of the 53 countries, per capita asbestos use (kg/capita/year) and age-adjusted mortality rates (deaths/million persons/year) due to mesothelioma and asbestosis were calculated using the databases of the United States Geological Survey and WHO,...

Journal: :Preventive medicine 2008
Manuela Etter Aqal Nawaz Khan Jean-François Etter

OBJECTIVE To assess the impact of a partial smoking ban followed by a total smoking ban in a psychiatric hospital in Switzerland. METHODS In 2003, smoking was allowed everywhere in psychiatric units. In 2004, smoking was prohibited everywhere except in smoking rooms. In 2006, smoking rooms were removed and smoking was totally prohibited indoors. Patients and staff were surveyed in 2003 (n=106...

Journal: :EMBO reports 2012

Journal: :JDIM 2013
Dong Sun Dan Liu

During recent years,RFID technology has a wide applications in many fields.Since singnal transmit by the radio frequency, it raises many security and privacy concerns. Ownership transfer of RFID tags is another requriement for RFID systems. During the life of tag, it may pass from manufacutrer to commercial agent, the ownership of tag need change correspondingly.Taking into account the natural ...

2000
Chong Xu Gershon Kedem Fengmin Gong

A taxonomy of cryptographic protocol attacks is helpful for cryptographic protocol analysis. There are taxonomies of cryptographic protocol awss5, 9] and a taxonomy of replay attacks in terms of message origin and destinationn25]. This paper presents an attack taxonomy based on an intruder's objectives when launching attacks and the roles s/he plays. Understanding an intruder's possible behavio...

1991
Rajashekar Kailar Virgil D. Gligor

Authentication protocols can be viewed from the perspective of the evolution of beliefs within a protocol run. Inference rules which ensue from this perspective are presented. These rules can be used to analyze the protocols which the BAN logic 1] can analyze. Additional protocols that can be analyzed include (1) inter-domain authentication where principals must trust all authen-tication server...

Journal: :IACR Cryptology ePrint Archive 2016
Yalin Chen Jue-Sam Chou Hung-Shen Wu

Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. By using BAN-logic and AVISPA tools, they confirm the security properties of the proposed scheme. However, after analyzing, we determine that the scheme could not resist the smart card loss password guessing attack...

2014
Michael Dietz Dan S. Wallach

Federated login protocols for the Web are intended to increase user security by reducing the proliferation of passwords that users are expected to remember and use on a day to day basis, however these protocols are vulnerable to recent attacks against TLS that allow attackers to extract session cookies and other such authentication tokens from within TLS sessions. A recent technique, TLS-OBC (o...

Journal: :JNW 2010
Feng-Yu Lei Guohua Cui Cai Fu Peng Xu Jing Chen

Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose an IBE-based authentication protocol as the security scheme, which can achieve the key establ...

Journal: :I. J. Network Security 2017
Guifa Hou Zhijie Wang

Along with the extensive prevalence of the network and the portable equipments, people can access network resources conveniently. The protection of participants’ privacy and data confidentiality is significant. Authentication mechanism is essential to assure the authenticity of all participants and forbid the illegal accessing. In this paper, we propose a robust remote authentication scheme wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید