Academic literature on the topic 'Interlock Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Interlock Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Interlock Protocol"

1

Paulanda, Jepri. "PENERAPAN INTERLOCK PROTOCOL DALAM PENCEGAHAN MAN-IN-THE-MIDDLE-ATTACK." JURNAL MAHAJANA INFORMASI 1, no. 2 (2018): 31–41. http://dx.doi.org/10.51544/jurnalmi.v1i2.168.

Full text
Abstract:
Problema man-in-the-middle-attack ini dapat diilustrasikan sebagai berikut, misalkan Alice dan Bob sedang berkomunikasi dan Mallory ingin menyadapnya. Ketika Alice mengirimkan kunci publiknya kepada Bob, Mallory dapat menangkap kunci ini dan mengirimkan kunci publiknya sendiri kepada Bob. Kemudian, ketika Bob mengirimkan kunci publiknya kepada Alice, Mallory juga dapat menangkap kunci tersebut dan mengirimkan kunci publiknya sendiri kepada Alice. Ketika Alice mengirimkan pesan kepada Bob yang dienkripsi dengan menggunakan kunci publik Bob, Mallory dapat menangkapnya. Karena pesan tersebut dienkripsi dengan menggunakan kunci publik Mallory, maka Mallory dapat mendekripsikan pesan tersebut dengan menggunakan kunci privatnya dan kemudian dienkripsi kembali dengan menggunakan kunci publik dari Bob dan mengirimkannya kepada Bob. Hal yang sama juga terjadi ketika Bob mengirimkan pesan kepada Alice. Mallory dapat mengetahui semua pesan yang dikirimkan oleh Bob dan Alice tersebut. Problema man-in-the-middle-attack ini dapat dicegah dengan menggunakan interlock protocol. Interlock protocol ini diciptakan oleh Ron Rivest dan Adi Shamir. Setelah menyelesaikan perangkat lunak simulasi pemanfaatan metode interlock protocol untuk mengatasi man-in-the-middle-attack, perangkat lunak mensimulasikan proses kerja man-in-the-middle-attack sebagai salah satu bentuk penyerangan terhadap metode kriptografi publik dan proses kerja interlock protocol untuk mengatasinya, sehingga perangkat lunak dapat digunakan untuk mendukung proses belajar mengajar, terutama dalam mata kuliah Kriptografi. Kata Kunci : Kriptografi, man-in-the-middle-attack, interlock protocol
APA, Harvard, Vancouver, ISO, and other styles
2

Pasaribu, Maranata, and Marice Hotnauli Simbolon. "Perancangan Simulator Interlock Protocol saat Serangan Man-in-the-Middle-Attack pada Kriptografi Kunci Publik RSA." LOFIAN: Jurnal Teknologi Informasi dan Komunikasi 1, no. 1 (2021): 1–6. http://dx.doi.org/10.58918/lofian.v1i1.157.

Full text
Abstract:
Dalam proses transmisi data, walaupun data telah dienkripsi, namun terdapat kemungkinan bahwa data tersebut dapat dimiliki oleh orang lain. Salah satu kemungkinan tersebut adalah dengan terjadinya penyadapan media komunikasi yang digunakan oleh kedua orang yang sedang berkomunikasi tersebut. Problema man-in-the-middle-attack ini dapat dicegah dengan menggunakan interlock protocol. Algoritma inti dari protokol ini yaitu mengirimkan 2 bagian pesan terenkripsi. Bagian pertama dapat berupa hasil dari fungsi hash satu arah (one way hash function) dari pesan tersebut dan bagian kedua berupa pesan terenkripsi itu sendiri. Penelitian ini akan merancang perangkat lunak simulasi yang dapat menjelaskan proses kerja dari man-in-the-middle-attack dalam menyadap dan mengubah pesan, menjelaskan proses kerja interlock protocol untuk mengatasi problema Man-In-The-Middle-Attack. Setelah menyelesaikan perangkat lunak simulasi, peneliti menarik kesimpulan: Dengan menggunakan interlock protocol, walaupun kunci publik pihak penerima dan pengirim didapatkan dan diganti oleh penyadap, tetapi penyadap tidak dapat menjalankan prosedur man-in-the-middle-attack untuk melihat dan mengubah pesan. Hal ini dikarenakan pesan terenkripsi terbagi menjadi dua bagian pada variasi pertama dan terdapat fungsi hash untuk memverifikasi keaslian pesan pada variasi kedua.
APA, Harvard, Vancouver, ISO, and other styles
3

Tae-Ho, Cho, and Jeon Garam-Moe. "DYNAMIC DELAY TIME DECISION METHOD FOR ENHANCING SECURITY OF THE FORCED LATENCY INTERLOCK PROTOCOL IN INTERNET OF THINGS." International Journal of Research – Granthaalayah 4, no. 2 (2017): 151–58. https://doi.org/10.5281/zenodo.848114.

Full text
Abstract:
Most devices in the Internet of Things (IoT) utilize WiMAX communication, and Femtocells are used to provide reliable communication by eliminating shaded areas where wireless signals become weaker with distance and underground facilities. One downfall of this method is the possibility of eavesdropping through Man-in-the-Middle attacks. Forced latency interlock protocol is used to detect these attacks. This protocol uses a fixed latency value and does not consider packet size and distance. In this paper, we propose a dynamic delay time decision method for reducing the fixed delay time of the forced latency interlock protocol in wireless communications based on the IoT. The evaluation function considers the distance between the device, the packet size, and the bit rate of the broadband internet. The simulation experiments demonstrate the validity of our method, which reduces delay time by an average of 88.19% and increases detection rate by an average of 7.97%.
APA, Harvard, Vancouver, ISO, and other styles
4

Cho, Tae-Ho, and Garam-Moe Jeon. "DYNAMIC DELAY TIME DECISION METHOD FOR ENHANCING SECURITY OF THE FORCED LATENCY INTERLOCK PROTOCOL IN INTERNET OF THINGS." International Journal of Research -GRANTHAALAYAH 4, no. 2 (2016): 151–58. http://dx.doi.org/10.29121/granthaalayah.v4.i2.2016.2825.

Full text
Abstract:
Most devices in the Internet of Things (IoT) utilize WiMAX communication, and Femtocells are used to provide reliable communication by eliminating shaded areas where wireless signals become weaker with distance and underground facilities. One downfall of this method is the possibility of eavesdropping through Man-in-the-Middle attacks. Forced latency interlock protocol is used to detect these attacks. This protocol uses a fixed latency value and does not consider packet size and distance. In this paper, we propose a dynamic delay time decision method for reducing the fixed delay time of the forced latency interlock protocol in wireless communications based on the IoT. The evaluation function considers the distance between the device, the packet size, and the bit rate of the broadband internet. The simulation experiments demonstrate the validity of our method, which reduces delay time by an average of 88.19% and increases detection rate by an average of 7.97%.
APA, Harvard, Vancouver, ISO, and other styles
5

Bellovin, S. M., and M. Merritt. "An attack on the Interlock Protocol when used for authentication." IEEE Transactions on Information Theory 40, no. 1 (1994): 273–75. http://dx.doi.org/10.1109/18.272497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

BAX, H., and U. WÄTJEN. "AUTOMATIZATION OF A PIXE SYSTEM FOR SERIES OF BIO-MEDICAL AND ENVIRONMENTAL ANALYSES." International Journal of PIXE 02, no. 03 (1992): 285–97. http://dx.doi.org/10.1142/s0129083592000294.

Full text
Abstract:
The PIXE chamber of CBNM, designed for high flexibility in analytical conditions and high throughput of samples, is equipped with stepper motors to serve the various movable components in the chamber. A versatile motor controller was designed which is steering all motors in the chamber, allows for a safety interlock system, and which can readily be expanded or adapted to more and other types of stepper motors if necessary. By interfacing this controller to a computer via the IEEE-488 protocol, it can be remotely controlled in order to automatize complete series of full analysis cycles. An integrated software package has been written, which combines the motor steering—including the necessary safety interlocks—with the control of all MCA functions under a single menu-oriented program. The modular design of the controller and the interfacing by standard IEEE-488 make it portable to other experiment environments.
APA, Harvard, Vancouver, ISO, and other styles
7

Feng, Jianyu, Yidong Yuan, Tianting Zhao, Xin Yang, Fang Liu, and Yue Zhuo. "Implementation of an Isolated I2C Interface Device Based on OOK Codec." Journal of Physics: Conference Series 2378, no. 1 (2022): 012045. http://dx.doi.org/10.1088/1742-6596/2378/1/012045.

Full text
Abstract:
Abstract As a wide used protocol in industry, BMS and T&D system, I2C bus with isolation features stands out to provide additional safety protection and noise immunity. This paper introduces an implementation method of the isolated I2C interface device with high reliability and low delay. This device can meet the I2C ultra-high speed working mode with communication frequency of 1.7MHz as well as prevent the occurrence of interlock in bi-directional communication. The device is fabricated in 0.18um CMOS process.
APA, Harvard, Vancouver, ISO, and other styles
8

SVOZIL, KARL. "FEASIBILITY OF THE INTERLOCK PROTOCOL AGAINST MAN-IN-THE-MIDDLE ATTACKS ON QUANTUM CRYPTOGRAPHY." International Journal of Quantum Information 03, no. 04 (2005): 649–54. http://dx.doi.org/10.1142/s0219749905001511.

Full text
Abstract:
If an eavesdropper succeeds in compromising the quantum as well as the classical channels and mimics the receiver "Bob" for the sender "Alice" and vice versa, one defence strategy is the successive, temporally interlocked partial transmission of the entire encrypted message.
APA, Harvard, Vancouver, ISO, and other styles
9

Fotohi, Reza, Somayyeh Firoozi Bari, and Mehdi Yusefi. "Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol." International Journal of Communication Systems 33, no. 4 (2019): e4234. http://dx.doi.org/10.1002/dac.4234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, J., P. Cao, Y. Wang, and W. Wang. "A clock synchronization and trigger distribution scheme for China Spallation Neutron Source." Journal of Instrumentation 19, no. 06 (2024): P06039. http://dx.doi.org/10.1088/1748-0221/19/06/p06039.

Full text
Abstract:
Abstract China Spallation Neutron Source (CSNS) is a complex system engineering composed of particle accelerators, a target station, and neutron spectrometers with various equipment types and distribution. The collaborative operation of the equipment requires accurate clock synchronization and trigger distribution. Currently, to meet the requirements of different system devices, clock synchronization and trigger distribution in CSNS are implemented based on different methods, resulting in complex clock and trigger networks, demanding upgrades, and a lack of unified timestamps. This paper proposes a clock synchronization and trigger distribution scheme based on the field-programmable gate array (FPGA) and single-mode dual-core fiber link. The decoupling of clock phase synchronization and time base synchronization improves the frequency of phase compensation. Benefiting from the phase interpolator (PI) in the FPGA transceivers, high-precision phase compensation and phase deterministic control are realized, achieving picoseconds synchronization precision and stability in the four-level network. Based on the custom lightweight link layer protocol, by optimizing the routing method of data frames and adopting priority control, the transmission of multiple data is realized, and the hardware delay of the critical data, such as interlock, is guaranteed to be less than 1.5 μs in the four-level system. The scheme provides a general precise clock synchronization and distributed trigger method for CSNS devices, simplifies the system complexity, and is conducive to the system upgrade in the second stage.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Interlock Protocol"

1

Clayton, John F. "Education, the Internet, and the World Wide Web." In Encyclopedia of Human Computer Interaction. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.

Full text
Abstract:
The development of the Internet has a relatively brief and well-documented history (Cerf, 2001; Griffiths, 2001; Leiner et al., 2000; Tyson, 2002). The initial concept was first mooted in the early 1960s. American computer specialists visualized the creation of a globally interconnected set of computers through which everyone quickly could access data and programs from any node, or place, in the world. In the early 1970s, a research project initiated by the United States Department of Defense investigated techniques and technologies to interlink packet networks of various kinds. This was called the Internetting project, and the system of connected networks that emerged from the project was known as the Internet. The initial networks created were purpose-built (i.e., they were intended for and largely restricted to closed specialist communities of research scholars). However, other scholars, other government departments, and the commercial sector realized the system of protocols developed during this research (Transmission Control Protocol [TCP] and Internet Protocol [IP], collectively known as the TCP/IP Protocol Suite) had the potential to revolutionize data and program sharing in all parts of the community. A flurry of activity, beginning with the National Science Foundation (NSF) network NSFNET in 1986, over the last two decades of the 20th century created the Internet as we know it today. In essence, the Internet is a collection of computers joined together with cables and connectors following standard communication protocols.
APA, Harvard, Vancouver, ISO, and other styles
2

Englund, Paul T., D. Lys Guilbride, kuo-yuan hwa, et al. "Kinetoplast DNA: structure and replication." In Molecular Biology of Parasitic Protozoa. Oxford University PressOxford, 1996. http://dx.doi.org/10.1093/oso/9780199636020.003.0005.

Full text
Abstract:
Abstract Trypanosomatid protozoa are parasites which are responsible for important human diseases in tropical areas of the world. Examples are Trypanosoma brucei, an African trypanosome, T. cruzi, a South American trypanosome, and Leishmania. These parasites are among the most primitive of the eukaryotes and, because of their ancient lineage, it is not surprising that they have unusual biological properties. They are among the first eukaryotes to have mitochondria and one of their most remarkable features is their mitochondrial DNA, known as kinetoplast DNA (kDNA). Unlike any other DNA in nature, kDNA is organized into a network containing several thousand topologically interlocked DNA circles. The circles are of two types. There are several thousand small minicircles and a few dozen larger maxicircles. Figure 1 shows an electron micrograph of part of a kDNA network from the trypanosomatid Crithidia fasciculata. Each cell contains a single network within the matrix of its single mitochondrion (for reviews, see Refs. 1-5).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Interlock Protocol"

1

Angula, Nikodemus, and Nomusa Dlodlo. "Towards the Development of an Interlink Protocol for Disease Surveillance Data Aggregation: A Namibian Context." In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE, 2018. http://dx.doi.org/10.1109/iconic.2018.8601209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hübner, A., A. C. R. Costa, G. P. Dimuro, V. L. D. Mattos, S. S. Hernandes, and M. M. Lange. "Introdução da Dimensão Dialógica no Moise+, com Aplicação na Modelagem de Processos de Gestão em uma Universidade Comunitária." In Workshop-Escola de Sistemas de Agentes, seus Ambientes e Aplicações. Sociedade Brasileira de Computação, 2010. https://doi.org/10.5753/wesaac.2010.33054.

Full text
Abstract:
Several proposals have been presented for modeling the organization of multiagent systems. One of them is MOISE+, which specifies three dimensions: the structural dimension, which defines roles and links of inheritance and groups; the functional dimension, which specifies a set of global plans and missions for the goals to be achieved; and the deontic dimension, which is responsible for assigning obligations and permissions to roles with respect to missions. The aim of this work is to introduce a fourth dimension in the MOISE+ model, focused in the communication between roles. For that, the model MOISE+ will be extended with a dialogic dimension that defines the protocols used for role communication. In order to interlink this new dimension to the MOISE+ model, new relations will be added to the deontic specification, which is responsible for indicating which protocols should or could be used to achieve the goals that constitute the roles’ missions. The use of the extended model is illustrate with a case study of the process of the creation of a graduate course in a community university.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography