Results 231 to 240 of about 305,823 (288)

Optimizing internet of things security through blockchain enabled software defined networking. [PDF]

open access: yesSci Rep
Tumula S   +8 more
europepmc   +1 more source

UNAUTHORIZED ACCESS TO QUANTUM KEY DISTRIBUTION SYSTEM

open access: yesIZVESTIYA SFedU. ENGINEERING SCIENCES
openaire   +1 more source

Retraction: Evaluation of 'Normal' Cognitive Functions and Correlation With MRI Volumetry: Towards a Definition of Vascular Cognitive Impairment. [PDF]

open access: yesCureus
Sundar U   +9 more
europepmc   +1 more source

Unauthorized access crime in Jordanian law (comparative study)

Digital Investigation, 2019
Abstract This research cared about clarifying the legal provisions of the unauthorized access crime contained in article 3 of the Jordanian Cybercrime act of 2015 and comparing it to other Arabic legislations and French law as well as clarifying the position of international conventions on this crime. The analysis of the crime included clarifying its
Hamzeh abu issa   +2 more
openaire   +3 more sources

Unauthorized Access Monitoring in Optical Access Networks

2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), 2020
The article deals with the problem of protecting information from unauthorized access. The results of comparative analysis of methods for information extracting from optical fiber lines are presented. The classification of extraction methods, physical conditions for leak channels formation is given.
E. T. Kitova   +2 more
openaire   +1 more source

Authorized! access denied, unauthorized! access granted

Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Existing access control systems are mostly identity-based. However, such access control systems impose risks because recognized identity is not essentially an interpretation of good intentions of access. On the other hand, an un-identified individual might request access to suppress damage or prevent a catastrophic incident from happening.
Abdulaziz Almehmadi, Khalil El-Khatib
openaire   +1 more source

Arbitrator2.0: Preventing Unauthorized Access on Passive Tags

IEEE Transactions on Mobile Computing, 2022
As the Ultra High Frequency (UHF) passive Radio Frequency IDentification (RFID) technology becomes increasingly deployed, it faces an array of new security attacks. In this paper, we consider a type of attack in which a malicious RFID reader could arbitrarily access the tags, e.g., retrieve or modify IDs or other data in the memory, via standard ...
Han Ding   +6 more
openaire   +1 more source

Unauthorized Access Offences in Cyberworld

2015
Computer hacking is the accessing of a computer system without the express or implied permission of the owner of that computer system (Bainbridge 2004, p. 381). A person who engages in this activity is known as a computer hacker and may simply be motivated by the mere thrill of being able to outwit the security systems contained in a computer.
Mohamed Chawki   +3 more
openaire   +1 more source

Preventing Unauthorized Access on Passive Tags

IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, 2018
As the Ultra High Frequency (UHF) passive Radio Frequency IDentification (RFID) technology becomes increasingly deployed, it faces an array of new security attacks. In this paper, we consider a type of attack in which a malicious RFID reader could arbitrarily modify the tags via standard commands, e.g., IDs or other data in the memory.
Han Ding   +6 more
openaire   +1 more source

Home - About - Disclaimer - Privacy