搜索结果: 1-3 共查到“军队指挥学 Cloning”相关记录3条 . 查询时间(0.062 秒)
Recently Qian et al. have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags' private infor...
THE DARK SIDE OF SECURITY BY OBSCURITY and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime
Access control RFID contactless smart cards
2009/6/12
MiFare Classic is the most popular contactless smart card with about 200 millions copies in circulation worldwide.
At Esorics 2008 Dutch researchers showed that the underlying cipher Crypto-1 can be ...
Attribute-Based Encryption with Key Cloning Protection
Attribute-Based Encryption (ABE) Access Control Key Delegation
2009/6/10
In this work, we consider the problem of key cloning in attribute-based encryption
schemes.We introduce a new type of attribute-based encryption scheme, called token-based attribute-based encryption,...