نتایج جستجو برای: untraceability

تعداد نتایج: 141  

2006
Giuseppe Ciaccio

In the framework of peer to peer distributed systems, the problem of anonymity in structured overlay networks remains a quite elusive one. It is especially unclear how to evaluate and improve sender anonymity, that is, untraceability of the peers who issue messages to other participants in the overlay. In a structured overlay organized as a chordal ring, we have found that a technique originall...

Journal: :I. J. Network Security 2015
Hai-Duong Le Chin-Chen Chang Yeh-Chieh Chou

In global mobile network, it is required to authenticate mobile users, provide secure communication channel between a user and a foreign agent using session key, and guarantee users’ anonymity and untraceability. In order to improve the security of mobile roaming service, twofactor authentication which employs smart card and password was introduced to global mobile network. In 2014, Kuo et al. ...

2014
Chien-Ming Chen Shuai-Min Chen Xinying Zheng Pei-Yu Chen Hung-Min Sun

RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the ...

2012
Ritu Dahiya Ravinder Dahiya

RFID (Radio Frequency Identification) is recently becoming popular due to its convenience and economical efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode. On the other hand, RFID is jeopardized from various attacks and problems as an obstacle of widespread RFID deployment: replay, spoofing, traceability, de-synchronization, un-scalability...

2006
Youngjoon Seo Tomoyuki Asano Hyunrok Lee Kwangjo Kim

RFID(Radio Frequency Identification) is now being used in everything for economic feasibility and convenience. In contrast, RFID tags may infringe on user’s privacy. A number of previous schemes exploiting hash function, symmetric cryptographic primitive like AES (Advanced Encryption Standard), asymmetric cryptographic primitive like ECC (Elliptic Curve Cryptosystem) are suitable for high-end R...

2008
Sheikh I. Ahamed Farzana Rahman Endadul Hoque Fahim Kawsar Tatsuo Nakajima

Several threats in RFID systems are obstacles to intermingle this technology into human lives. On the other hand ensuring flexible privacy mechanism has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we de...

Journal: :JNW 2012
Jingjun Miao Liangmin Wang

Mobile nodes in the Internet of things often move from one cluster to another, in which cryptography based protocols are required to provide rapid identification authentication and privacy protection. A single-step protocol was presented for the occasion that the mobile node joins a new cluster. The presented protocol contains a valid request message and an answer authentication message, which ...

2013
Vincent Cheval Véronique Cortier Antoine Plet

Security protocols have been successfully analyzed using symbolic models, where messages are represented by terms and protocols by processes. Privacy properties like anonymity or untraceability are typically expressed as equivalence between processes. While some decision procedures have been proposed for automatically deciding process equivalence, all existing approaches abstract away the infor...

2010
Christian Wachsmann Liqun Chen Kurt Dietrich Hans Löhr Ahmad-Reza Sadeghi Johannes Winter

Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes is that users cannot easily be prevented from copying and sharing credentials. In this paper, we propose an anonymous authentication scheme for mobile devices that prevents copying and sharing of credentials based on...

2016
Véronique Cortier Antoine Dallon Stéphanie Delaune

Bounding the number of agents is a current practice when modeling a protocol. In 2003, it has been shown that one honest agent and one dishonest agent are indeed sufficient to find all possible attacks, for secrecy properties. This is no longer the case for equivalence properties, crucial to express many properties such as vote privacy or untraceability. In this paper, we show that it is suffic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید