نتایج جستجو برای: forward traceability attack
تعداد نتایج: 203777 فیلتر نتایج به سال:
Design of ultra-lightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. have proposed a CRC based authentication protocol and claimed that their protocol can resist against all known attacks in RFID systems. However, in this paper we show that their protocol is vulnerable to...
Several regulatory agencies around the world are involved in rulemaking to improve the traceability of foods. Given the complexity of the global food system, guidance on improving traceability practices across the entire food industry is a challenge. A review of the current regulations and best practices indicates that “one back, one forward” is the minimum traceability requirement. There are a...
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceabil...
Relying on the Internet of things platform, building a traceability system ranging from the source to dinner table is the crucial issue of meat products to be solved at the moment. On the basis of knowing the current situation of domestic and international food traceability quo, the passage will put forward the feasibility of mobile query used in food traceability queries, mainly targeting elab...
Audio watermarking is widely used for leaking source tracing. The robustness of the watermark determines traceability algorithm. With development digital technology, audio re-recording (AR) has become an efficient and covert means to steal secrets. AR process could drastically destroy signal while preserving original information. This puts forward a new requirement at this stage, that is, be ro...
An extensive experimental investigation is conducted to study the effect of canard position relative to the fuselage reference line on the aerodynamic forces of a fighter type configuration model. Aerodynamic forces at different flight conditions are measured in a subsonic wind tunnel. The wing and the canard have triquetrous shapes. Experiments are conducted at Reynolds number of 342209 and at...
A real time estimation of the number of zombies in DDoS attack scenario is helpful to suppress the effect of attack by choosing predicted number of most suspicious attack sources for either filtering or rate limiting. In this paper, ANN is employed to estimate number of zombies involved in a DDoS attack. The method does not depend on the frequency of attack and hence solves the problem of low d...
An extensive experimental study is conducted to examine effects of different winglet-shapes and orientations on the vortex behind a wing, static surface pressure over the wing, and wing wake of a swept wing at various angles of attack. Four types of winglets, spiroid (forward and aft), blended, and winggrid are used in this investigation. Wing static surface pressure measurements are obtained f...
Aiming at the problems existed in agricultural product quality control, management and traceability such as the considerable influence of human factors, weak ability of handling emergencies and lacking of support of intelligent key technologies, this study explores the application of agent theory, method and technique to solve the problems of process control, traceability, intelligent informati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید