Protocol analysis

Results: 1021



#Item
321Password / Security / Transaction authentication number / Data / Cryptographic protocols / Computer security / Challenge-response authentication

Security Analysis of A Remote User Authentication Protocol by Liao and Wang Dang Nguyen Duc∗,a , Kwangjo Kima a Auto-ID Lab Korea, Department of Information and Communications Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-09 03:45:40
322Behavior / Habits / Welfare economics / World Health Organization / World Health Organization Framework Convention on Tobacco Control / Cost–benefit analysis / Smoking / Organized crime / Globalization / Ethics / Human behavior / Tobacco

Cost Benefit Analysis of the FCTC Protocol on Illicit Trade in Tobacco Products A Report Prepared for ASH by Paul Johnson Paul Johnson is an independent economist and prepared this report in

Add to Reading List

Source URL: www.ash.org.uk

Language: English - Date: 2012-11-22 11:39:01
323Fluid dynamics / Energy conversion / Gasification / Thermal treatment / Gas / Temperature / Energy / Physics / Fuel gas

Energy project ERK6-CT1999Tar protocol) Guideline for Sampling and Analysis of Tar and Particles in Biomass Producer Gases

Add to Reading List

Source URL: www.eeci.net

Language: English - Date: 2007-06-06 03:32:05
324Network topology / Computing / Node / Wireless networking / Technology / Routing algorithms / Science / Backpressure Routing / Link-state routing protocol / Cybernetics / Routing / Control theory

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 56, NO. 10, OCTOBERCompositional Modeling and Analysis of Multi-Hop Control Networks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-03-05 17:36:23
325Automatic identification and data capture / Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / Transmission Control Protocol / Chebyshev polynomials / X Window System / Software / Computing / Mathematical analysis

Weaknesses in a Recently Proposed RFID Authentication Protocol Mete Akg¨ un1 , and M. Ufuk C ¸ aˇglayan2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-18 04:24:22
326Analysis of algorithms / Randomness / Advantage / Randomized algorithm / Adversary model / Pseudorandomness / Transmission Control Protocol / Randomness extractor / Random number generation / Cryptography / Theoretical computer science / Applied mathematics

Authenticated Key Exchange under Bad Randomness? Guomin Yang1 , Shanshan Duan2 , Duncan S. Wong3 , Chik How Tan1 , and Huaxiong Wang4 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-18 22:21:28
327Network protocols / Data transmission / Inter-process communication / Communications protocol / Protocols / Server Message Block / Cluster analysis / Hierarchical clustering / Email / Computing / Statistics / Data

Towards Automated Protocol Reverse Engineering Using Semantic Information Georges Bossert*† Frédéric Guihéry*

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2014-07-01 03:28:58
328Web 2.0 / Skype / File sharing / Cross-platform software / Skype protocol / Kazaa / Peer-to-peer / Gnutella / Traffic flow / Software / Computing / File sharing networks

Protocol Identification via Statistical Analysis (PISA) BlackHat 2007 Rohit Dhamankar and Rob King Agenda

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
329Ubiquitous computing / Wireless / Physical Unclonable Function / Technology / Authentication protocol / Telecommunications engineering / Computing / Automatic identification and data capture / Privacy / Radio-frequency identification

Security Analysis of a PUF based RFID Authentication Protocol Masoumeh Safkhani1 , Nasour Bagheri2 and Majid Naderi1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-09 03:59:55
330Computing / Computer keyboard / Bluetooth / Transmission Control Protocol / Universal Serial Bus / Secure communication / Communications protocol / Keystroke logging / Technology / Telecommunications engineering / Wireless

27Mhz Wireless Keyboard Analysis Report aka “We know what you typed last summer” Authors: Max Moser & Philipp Schrödel ( Dreamlab Technologies AG & Remote-exploit.org ) Table of Contents

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
UPDATE