نتایج جستجو برای: ban logic
تعداد نتایج: 157888 فیلتر نتایج به سال:
OBJECTIVE To analyse national data on asbestos use and related diseases in the European Region of the World Health Organization (WHO). METHODS For each of the 53 countries, per capita asbestos use (kg/capita/year) and age-adjusted mortality rates (deaths/million persons/year) due to mesothelioma and asbestosis were calculated using the databases of the United States Geological Survey and WHO,...
OBJECTIVE To assess the impact of a partial smoking ban followed by a total smoking ban in a psychiatric hospital in Switzerland. METHODS In 2003, smoking was allowed everywhere in psychiatric units. In 2004, smoking was prohibited everywhere except in smoking rooms. In 2006, smoking rooms were removed and smoking was totally prohibited indoors. Patients and staff were surveyed in 2003 (n=106...
During recent years,RFID technology has a wide applications in many fields.Since singnal transmit by the radio frequency, it raises many security and privacy concerns. Ownership transfer of RFID tags is another requriement for RFID systems. During the life of tag, it may pass from manufacutrer to commercial agent, the ownership of tag need change correspondingly.Taking into account the natural ...
A taxonomy of cryptographic protocol attacks is helpful for cryptographic protocol analysis. There are taxonomies of cryptographic protocol awss5, 9] and a taxonomy of replay attacks in terms of message origin and destinationn25]. This paper presents an attack taxonomy based on an intruder's objectives when launching attacks and the roles s/he plays. Understanding an intruder's possible behavio...
Authentication protocols can be viewed from the perspective of the evolution of beliefs within a protocol run. Inference rules which ensue from this perspective are presented. These rules can be used to analyze the protocols which the BAN logic 1] can analyze. Additional protocols that can be analyzed include (1) inter-domain authentication where principals must trust all authen-tication server...
Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. By using BAN-logic and AVISPA tools, they confirm the security properties of the proposed scheme. However, after analyzing, we determine that the scheme could not resist the smart card loss password guessing attack...
Federated login protocols for the Web are intended to increase user security by reducing the proliferation of passwords that users are expected to remember and use on a day to day basis, however these protocols are vulnerable to recent attacks against TLS that allow attackers to extract session cookies and other such authentication tokens from within TLS sessions. A recent technique, TLS-OBC (o...
Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose an IBE-based authentication protocol as the security scheme, which can achieve the key establ...
Along with the extensive prevalence of the network and the portable equipments, people can access network resources conveniently. The protection of participants’ privacy and data confidentiality is significant. Authentication mechanism is essential to assure the authenticity of all participants and forbid the illegal accessing. In this paper, we propose a robust remote authentication scheme wit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید