نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
Previous laboratory research has demonstrated that symbolic highway signs which have undergone the Recursive Blur Technique of visual enhancement exhibit significantly increased legibility distances over standard symbolic highway signs when using a critical detail identification task. This study sought to extend those findings to a new stimulus subset, and develop an identification task that is...
We introduce a new protocol designed to assist in the forensic investigation of malicious network-based activity, specifically addressing the stepping-stone scenario in which an attacker uses a chain of connections through many hosts to hide his or her identity. Our protocol, the Session TOken Protocol (STOP), enhances the Identification Protocol (ident) infrastructure by sending recursive requ...
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt ’95. Our cryptanalysis enables a polynomial-time attacker to pass the identification protocol with probability one, without knowing the private key.
RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...
In this paper, first we discuss the security model for deterministic challenge-response identification protocols. For such protocols, we are able to simplify the CR2 security model in [2] which captures concurrent attacks and reset attacks. Then we propose an extremely simple identification protocol and prove that its CR2 security is equivalent to the hardness of the Strong Diffie-Hellman problem.
The tic k e ts o f F ra n k Flynn/Nikki Wellman and David R e in ke /L a ra D ickey earned spots in a Wednesday ru n -o ff fo r Notre Dame student body p res ident and vice p res ident a fte r no t ic k e t c a p tu re d a m a jo rity in M onday’s general election. Flynn/Wellman received 35.1 p e rcen t (1,451 votes) o f the electorate, while Reinke/Dickey received 32.5 percent (1,343) — and th...
The objective of ent i ty identification i s t o determine the correspondence between object instances f r o m more than one database. This paper ezamines the problem at the instance level assuming that schema level heterogeneity has been resolved a priori . Soundness and completeness are defined as the desired properties of any ent i ty identification technique. To achieve soundness, a set of ...
A little girl, Linda Collins, cut her finger while playing. Taken to hospital to have it sutured she was routinely tested for tetanus antitoxin sensitivity. Within minutes she was in violent anaphylactic shock. It was touch and go for several days. The year was 1956, the place l'urlock, California. Linda's father, Dr. Marion Collins, decided then that a distinctive ident must be devised to prev...
The restricted identification protocol for the new German identity card basically provides a method to use pseudonyms such that they can be linked by individual service providers, but not across different service providers (even not malicious ones). The protocol can be augmented to allow also for signatures under the pseudonyms. In this paper, we thus view —and define— this idea more abstractly...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید