secret disclosure
Recently Published Documents


TOTAL DOCUMENTS

13
(FIVE YEARS 2)

H-INDEX

4
(FIVE YEARS 0)

Author(s):  
Keely Fox ◽  
Alexandria M. Ashley ◽  
Lacey J. Ritter ◽  
Tara Martin ◽  
David Knox

2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Mostafa Yavari ◽  
Masoumeh Safkhani ◽  
Saru Kumari ◽  
Sachin Kumar ◽  
Chien-Ming Chen

Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices information with distributed attitude a new authentication protocol based on blockchain is proposed and it is claimed that this protocol satisfies user privacy preserving and security. However, in this paper, we show that this protocol has security vulnerabilities against secret disclosure, replay, traceability, and Token reuse attacks with the success probability of 1 and constant complexity of also 1. We also proposed an improved blockchain-based authentication protocol (IBCbAP) that has security properties such as secure access management and anonymity. We implemented IBCbAP using JavaScript programming language and Ethereum local blockchain. We also proved IBCbAP’s security both informally and formally through the Scyther tool. Our comparisons showed that IBCbAP could provide suitable security along with reasonable cost.


Author(s):  
Aakanksha Tewari ◽  
Brij B. Gupta

Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household objects as well as wireless sensor networks and devices. IoT has a huge potential which is still to be unleashed. However, as the foundation of IoT is the Internet and all the data collected by these devices is over the Internet, these devices also face threats to security and privacy. At the physical or sensor layer of IoT devices the most commonly used technology is RFID. Thus, securing the RFID tag by cryptographic mechanisms can secure our data at the device as well as during communication. This article first discusses the flaws of our previous ultra-lightweight protocol due to its vulnerability to passive secret disclosure attack. Then, the authors propose a new protocol to overcome the shortcomings of our previous work. The proposed scheme uses timestamps in addition to bitwise operation to provide security against de-synchronization and disclosure. This research also presents a security and performance analysis of our approach and its comparison with other existing schemes.


2019 ◽  
Vol 2019 (1) ◽  
pp. 19352
Author(s):  
Steven Mueller ◽  
Jessica Carre ◽  
Daniel Nelson Jones

2018 ◽  
Vol 2 (1) ◽  
pp. 61
Author(s):  
Desti Samarenna

The author through this article describes the grace of God’s secret revelation to Paul to require a deep understanding for all the congregations at Ephesus. The correct response to the secret disclosure of the group the angel wants to know. The revelation of the mystery raises the quality of the person as part of the new community, so god is glorified through the life of every believer and community as the possession of a noble and responsible identity to show the characters God givesAbstrakPenulis melalui tulisan ini, menguraikan tentang anugerah atas pengungkapan rahasia Allah kepada Paulus sehingga memerlukan pemahaman yang dalam bagi semua jemaat Efesus, bagaimana respon yang benar terhadap pengungkapan rahasia tentang jemaat. Penyataan misteri itu akan meningkatkan kualitas pribadi sebagai bagian dari komunitas yang baru itu, sehingga Allah dimuliakan melalui kehidupan setiap orang yang percaya dan komunitas sebagai jemaat yang memberi pengaruh yaitu memiliki identitas yang mulia dan bertanggung jawab untuk menunjukkan identitas yang Allah berikan


2016 ◽  
Vol 13 (1) ◽  
pp. 49-61 ◽  
Author(s):  
Daniel Kaushansky ◽  
Jarad Cox ◽  
Chaka Dodson ◽  
Miles McNeeley ◽  
Sinthu Kumar ◽  
...  

Objectives This qualitative study examines how and why adolescents living with visible and invisible chronic illnesses choose to share their condition with individuals within their social environments. Methods A sample of 25 adolescents were recruited from five subspecialty services: Spina bifida, rheumatology, cardiology, cystic fibrosis, and renal transplant/dialysis. Recruits completed a semi-structured interview designed to explore: (1) to whom adolescents disclose their conditions, (2) motivation and conditions under which they disclose, (3) content of disclosure, and (4) barriers to disclosure. Results Family members closely connected to treatment or management are most likely to be primary targets of disclosure. Regardless of social network size, respondents disclosed their illness to few peers. Common reasons for disclosure were perceived trust and shared experience with illness and disability. Reasons for withholding disclosure include perceived fear of rejection, pity, and perceptions of being seen as vulnerable or different. Discussion Disclosure was found to be influenced by (a) the visibility of a condition, (b) the anticipated response from the recipient, (c) practical needs, and (d) a decision that disclosure is justified. These findings inform clinical practice, warrant the need for further study, and insinuate practical solutions to combat the socio-emotional impact of nondisclosure among adolescents.


2014 ◽  
Vol 42 (4) ◽  
pp. 524-551 ◽  
Author(s):  
Young-Joo Han ◽  
Karen M. O’Brien
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document