-
21
Vulnerability of Transportation Networks to Traffic-Signal Tampering
Published 2017“…Indeed, recent studies have shown that many traffic lights deployed in practice have easily exploitable vulnerabilities, which allow an attacker to tamper with the configuration of the signal. Due to hardware-based failsafes, these vulnerabilities cannot be used to cause accidents. …”
Get full text
Get full text
Article -
22
-
23
-
24
Effect of source tampering in the security of quantum cryptography
Published 2015“…In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. …”
Get full text
Get full text
Article -
25
Review on passive approaches for detecting image tampering
Published 2014“…Passive, or blind, approaches for detecting image tampering are regarded as a new direction of research. …”
Get full text
Conference or Workshop Item -
26
-
27
-
28
-
29
Reversible Medical Image Watermarking for Tamper Detection and Recovery
Published 2010“…A design of a reversible tamper detection and recovery watermarking scheme was then proposed. …”
Get full text
Conference or Workshop Item -
30
Proposed Protocol for State Tampering Mobile Agents Security
Published 2009-12-01Subjects: Get full text
Article -
31
The US of America: Speech at the NAAS Conference in Tampere, 2007
Published 2008-10-01Get full text
Article -
32
Tamper-Resistant Mobile Health Using Blockchain Technology
Published 2017-07-01“…We further ensured that any electronic health record registered to the blockchain network was resistant to tampering and revision. The mHealth data update was compatible with tamper resistance in the blockchain network. …”
Get full text
Article -
33
Detection of tamper forgery image in security digital mage
Published 2023-06-01Subjects: Get full text
Article -
34
Predicate encryption against master-key tampering attacks
Published 2019-08-01Subjects: “…Tampering resilience…”
Get full text
Article -
35
Functional properties of thermally tampered poly(ethylene oxide)
Published 2022-09-01Get full text
Article -
36
Secure Physical Enclosures from Covers with Tamper-Resistance
Published 2018-11-01Subjects: “…Tamper-resistance…”
Get full text
Article -
37
Failure analysis of tamper resistant materials for IC packaging
Published 2019“…With equipment technology advancement, attackers may utilize them to tamper with the devices to retrieve information in an unorthodox manner. …”
Get full text
Get full text
Thesis -
38
Image tampering detection based on level or type of blurriness
Published 2015“…With the development of sophisticated photo-editing tools, image manipulation and forgery can be done easily and detection of tampered images by human eyes is difficult. Since images can be used in journalism, medical diagnosis, police investigation and as court evidences; image tampering can be a threat to the security of people and human society. …”
Get full text
Thesis -
39
Tamper-proof image watermarking using self-embedding
Published 2013“…We propose a fragile watermarking with self-embedding for recovery of tampered image that does not use authentication bits. …”
Get full text
Get full text
Conference Paper -
40