Showing 21 - 40 results of 5,822 for search '"Tampere"', query time: 0.16s Refine Results
  1. 21

    Vulnerability of Transportation Networks to Traffic-Signal Tampering by Laszka, Aron, Potteiger, Bradley, Vorobeychik, Yevgeniy, Amin, Saurabh, Koutsoukos, Xenofon

    Published 2017
    “…Indeed, recent studies have shown that many traffic lights deployed in practice have easily exploitable vulnerabilities, which allow an attacker to tamper with the configuration of the signal. Due to hardware-based failsafes, these vulnerabilities cannot be used to cause accidents. …”
    Get full text
    Get full text
    Article
  2. 22
  3. 23
  4. 24

    Effect of source tampering in the security of quantum cryptography by Sun, Shi-Hai, Xu, Feihu, Jiang, Mu-Sheng, Ma, Xiang-Chun, Lo, Hoi-Kwong, Liang, Lin-Mei

    Published 2015
    “…In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. …”
    Get full text
    Get full text
    Article
  5. 25

    Review on passive approaches for detecting image tampering by Hashem, Fatma Salman, Sulong, Ghazali

    Published 2014
    “…Passive, or blind, approaches for detecting image tampering are regarded as a new direction of research. …”
    Get full text
    Conference or Workshop Item
  6. 26
  7. 27
  8. 28
  9. 29

    Reversible Medical Image Watermarking for Tamper Detection and Recovery by Liew, Siau-Chuin, Jasni, Mohamad Zain

    Published 2010
    “…A design of a reversible tamper detection and recovery watermarking scheme was then proposed. …”
    Get full text
    Conference or Workshop Item
  10. 30
  11. 31
  12. 32

    Tamper-Resistant Mobile Health Using Blockchain Technology by Ichikawa, Daisuke, Kashiyama, Makiko, Ueno, Taro

    Published 2017-07-01
    “…We further ensured that any electronic health record registered to the blockchain network was resistant to tampering and revision. The mHealth data update was compatible with tamper resistance in the blockchain network. …”
    Get full text
    Article
  13. 33
  14. 34

    Predicate encryption against master-key tampering attacks by Yuejun Liu, Rui Zhang, Yongbin Zhou

    Published 2019-08-01
    Subjects: “…Tampering resilience…”
    Get full text
    Article
  15. 35
  16. 36
  17. 37

    Failure analysis of tamper resistant materials for IC packaging by Siah, Yu Wen

    Published 2019
    “…With equipment technology advancement, attackers may utilize them to tamper with the devices to retrieve information in an unorthodox manner. …”
    Get full text
    Get full text
    Thesis
  18. 38

    Image tampering detection based on level or type of blurriness by Bahrami, Khosro

    Published 2015
    “…With the development of sophisticated photo-editing tools, image manipulation and forgery can be done easily and detection of tampered images by human eyes is difficult. Since images can be used in journalism, medical diagnosis, police investigation and as court evidences; image tampering can be a threat to the security of people and human society. …”
    Get full text
    Thesis
  19. 39

    Tamper-proof image watermarking using self-embedding by Makur, Anamitra, Narayan S., Nikhil

    Published 2013
    “…We propose a fragile watermarking with self-embedding for recovery of tampered image that does not use authentication bits. …”
    Get full text
    Get full text
    Conference Paper
  20. 40