搜索结果: 1-12 共查到“flaws”相关记录12条 . 查询时间(0.046 秒)
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017
secret sharing multiplicative verifiability
2018/1/27
In this paper, we point out flaws in an existing verifiably multiplicative secret sharing (VMSS) scheme. Namely, we show that a scheme proposed by Yoshida and Obana presented at ICITS 2017 is insecure...
Tool for checking complex computer architectures reveals flaws in emerging design
Tool checking complex computer architectures flaws
2017/4/27
With backing from some of the largest technology companies, a major project called RISC-V seeks to facilitate open-source design for computer chips, offering the possibility of opening chip designs be...
Eliminating the Flaws in New England’s Reserve Markets
England’s Reserve Markets Eliminating
2015/9/18
New England’s wholesale electricity market has been in operation, since May 1, 1999. When the
market began it was understood that the rules were not perfect (Cramton and Wilson 1998). However, it
...
UW researchers hack a teleoperated surgical robot to reveal security flaws(图)
UW researchers teleoperated surgical robot reveal security flaws
2015/5/25
To make cars as safe as possible, we crash them into walls to pinpoint weaknesses and better protect people who use them.That’s the idea behind aseries of experimentsconducted by a University of Washi...
Uinversity of Illinois at Chicago researchers have discovered a way to create a highly sensitive chemical sensor based on the crystalline flaws in graphene sheets. The imperfections have unique electr...
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Authentication Key agreement Masquerade attack Privileged insider attack
2011/7/25
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Authentication Key agreement Masquerade attack Privileged insider attack Elliptic curve cryptosystem Smart card
2012/3/27
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) for multi-server communication e...
Non-destructive Evaluation Method for Far-side Corrosion Type Flaws in Oil Storage Tank Bottom Floors Using the Magnetic Flux Leakage Technique
Non-destructive testing Magnetic leakage field Oil storage tank
2009/7/24
A quantitative procedure based on the magnetic flux leakage technique was proposed to evaluate the size of metal-loss type flaws such as corrosion pits in oil storage tank bottom floors. The approach...
Flaws in Some Self-Healing Key Distribution Schemes with Revocation
self-healing key distribution lower bounds polynomial interpolation
2009/6/5
Dutta and Mukhopadhyay have recently proposed some very efficient self-
healing key distribution schemes with revocation. The parameters of these
schemes contradict some results (lower bounds) prese...
Security Flaws in Several Group Signatures Proposed by Popescu
group signature digital signature information security
2009/4/10
In resent years, Popescu proposed several group signature
schemes based on the Okamoto-Shiraishi assumption in [8{11], and claimed
his schemes are secure. However, this paper demonstrates that these...
Security Flaws in a Pairing-based Group Signature Scheme
Security Flaws Pairing-based Group Signature Scheme
2009/4/1
Deng and Zhao recently proposed a group signature scheme in [1].We find that the scheme cannot satisfy all of the requirements of a secure group signature.Keywords group signature scheme, bilinear pai...
Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol
Cryptanalytic Flaws ID-Based Authenticated Key Protocol
2008/5/23
A key agreement protocol is designed for two or more
entities to agree upon a shared secret key, which is used
to preserve confidentiality and data integrity over an open
network. In 2007, Oh et al...