نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

Journal: :Automatic Control and Computer Sciences 2021

Traceability schemes that are applied to broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme, distributor broadcasts encrypted data and gives each authorized user unique key identifying word selected error-correcting code for decrypting. The following attack is possible in these schemes: groups of c malicious users join into coalit...

Journal: :International Journal of Computer Applications 2012

2006
Jay Xiong Jonathan Xiong

This paper describes a new type of model for software engineering: the DP&T Model. It is an important part of the new DP&T System that is driven by defect prevention and traceability. Differing from traditional linear models, the DP&T Model is nonlinear, with the capability for forward and backward traceablity. This model is used to develop new software products, prevent defects, and fix incons...

2012
Ritu Dahiya Ravinder Dahiya

RFID (Radio Frequency Identification) is recently becoming popular due to its convenience and economical efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode. On the other hand, RFID is jeopardized from various attacks and problems as an obstacle of widespread RFID deployment: replay, spoofing, traceability, de-synchronization, un-scalability...

Journal: :International Journal of Students' Research in Technology & Management 2018

1997
António Rito Silva Teresa Gonçalves Francisco Assis Rosa Arne-Jørgen Berre Jan Øyvind Aagedal

This paper introduces an object-oriented approach to the integrated modeling of Organizations, and their Information Systems in a Distributed context. The approach is based on the OOram role modeling methodology concepts and tool. In the proposed approach organization modeling is done at the enterprise level of abstraction and both reverse and forward engineering are consistently supported. Dis...

2006
Jay Xiong Jonathan Xiong

This paper describes a new methodology for software engineering: the DP&T Methodology. It is the core component of the new DP&T System. Different from traditional methodologies with linear process models, the DP&T Methodology uses the nonlinear DP&T Model with the capacity for forward and backward traceablity. Driven by six types of automated traceability and two types of defect prevention, the...

Journal: :Designs, Codes and Cryptography 2022

Abstract In this paper we consider complete traceability multimedia fingerprinting codes resistant to averaging attacks and adversarial noise. Recently it was shown that there are no such for the case of an arbitrary linear attack. However, exponential cardinality constant noise were constructed in Egorova et al. (Probl Inf Transm 56(4):388–398, 2020). We continue work provide improved lower bo...

Journal: :IACR Cryptology ePrint Archive 2009
Qingfeng Cheng Chuangui Ma

Recently, Dario Fiore and Rosario Gennaro proposed the IB-KA protocol, which was inspired by MQV protocol. They provide a full proof of security of IB-KA protocol using techniques developed by Krawczyk in the Canetti-Krawczyk model. They designed the IB-KA protocol with some security properties such as perfect forward secrecy, reflection attack resilience, and key compromise impersonation resil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید