搜索结果: 1-13 共查到“军事学 ownership”相关记录13条 . 查询时间(0.015 秒)
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes access control decision...
Secure Channel Injection and Anonymous Proofs of Account Ownership
privacy anonymity zero knowledge
2016/12/8
We introduce secure channel injection (SCI) protocols, which allow one party to insert a private message into another party's encrypted communications. We construct an efficient SCI protocol for commu...
KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols
RFID cryptanalysis privacy
2016/12/8
Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes...
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
cryptanalysis anonymity RFID
2016/1/5
Sundaresan et al proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this p...
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
RFID ownership transfer ownership delegation
2015/12/29
Over the past decade, besides authentication, ownership management protocols have been suggested to transfer or delegate the ownership of RFID tagged items. Recently, Niu et al. have proposed an authe...
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Cloud Storage Client-side Deduplication
2014/3/10
Client-side deduplication is a very effective mechanism to reduce both storage and communication cost in cloud storage service. Halevi~\emph{et al.} (CCS '11) discovered security vulnerability in exis...
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
RFID Ownership Transfer Protocols Privacy Key Change Protocol
2013/4/18
Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/6/14
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/3/20
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/8/28
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
Proofs of Ownership in Remote Storage Systems
applications / Cloud storage deduplication proofs-or-knowledge proofs-of-retrievability
2012/3/28
Cloud storage systems are increasingly popular nowadays, and a promising technology to keep their cost down is *deduplication*, namely removing unnecessary copies of repeating data. Moreover, *client-...
ROTIV: RFID Ownership Transfer with Issuer Verification
RFID ownership transfer issuer verification
2010/12/14
RFID tags travel between partner sites in a supply chain. For privacy reasons, each partner “owns” the tags present at his site, i.e., the owner is the only entity able to authenticate his tags. Howev...
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
RFID privacy pseudonym protocol cryptography
2009/3/4
The ability to link two different sightings of the same Radio
Frequency Identification (RFID) tag enables invasions of privacy. The
problem is aggravated when an item, and the tag attached to it, ch...