Showing 121 - 140 results of 5,822 for search '"Tampere"', query time: 0.12s Refine Results
  1. 121

    Using Blockchain to Protect 3D Printing from Unauthorized Model Tampering by Yajing Wang, Yaodong Yang, Shuaipeng Suo, Mingyuan Wang, Weifeng Rao

    Published 2022-08-01
    “…If the original design models or the STL (stereolithography) files are hacked or tampered, severe consequences can be anticipated. In this paper, we propose a demonstration to use a high-throughput blockchain to store the “fingerprints” of the 3D model and verify the “fingerprints” before printing to prevent illegal tampering. …”
    Get full text
    Article
  2. 122

    No One Can Escape: A General Approach to Detect Tampered and Generated Image by Kejun Zhang, Yu Liang, Jianyi Zhang, Zhiqiang Wang, Xinxin Li

    Published 2019-01-01
    “…Fake or tampered images pose a real problem in today's life. …”
    Get full text
    Article
  3. 123

    A cycle-level recovery method for embedded processor against HT tamper by Wanting Zhou, Kuo-Hui Ye, Shiwei Yuan, Lei Li

    Published 2023-06-01
    “…However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against HT tamper is proposed, which builds two hardware-implementation units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. …”
    Get full text
    Article
  4. 124

    PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion by Ming-Chang Lu, Qi-Xian Huang, Min-Yi Chiu, Yuan-Chia Tsai, Hung-Min Sun

    Published 2022-02-01
    “…We here propose a physical security system that can protect data from unauthorized access when the computer chassis is opened or tampered with. Sensor switches monitor the chassis status at all times and upload event logs to a cloud server for remote monitoring. …”
    Get full text
    Article
  5. 125

    Genes involved in systemic and arterial bed dependent atherosclerosis--Tampere Vascular study. by Mari Levula, Niku Oksala, Nina Airla, Rainer Zeitlin, Juha-Pekka Salenius, Otso Järvinen, Maarit Venermo, Teemu Partio, Jukka Saarinen, Taija Somppi, VeliPekka Suominen, Jyrki Virkkunen, Juha Hautalahti, Reijo Laaksonen, Mika Kähönen, Ari Mennander, Leena Kytömäki, Juhani T Soini, Jyrki Parkkinen, Markku Pelto-Huikko, Terho Lehtimäki

    Published 2012-01-01
    “…METHODOLOGY/PRINCIPAL FINDINGS: We characterized the genes generally involved in human advanced atherosclerotic (AHA type V-VI) plaques in carotid and femoral arteries as well as aortas from 24 subjects of Tampere Vascular study and compared the results to non-atherosclerotic internal thoracic arteries (n=6) using genome-wide expression array and QRT-PCR. …”
    Get full text
    Article
  6. 126

    A Robust Image Tampering Detection Method Based on Maximum Entropy Criteria by Bo Zhao, Guihe Qin, Pingping Liu

    Published 2015-12-01
    Subjects: “…image tampering detection…”
    Get full text
    Article
  7. 127

    EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System by Louis Shekhtman, Erez Waisbard

    Published 2021-05-01
    “…In this work, we present a tamper-resistant log system through the use of a blockchain. …”
    Get full text
    Article
  8. 128
  9. 129
  10. 130
  11. 131

    Mitigation of tampering attacks for MR-based thermal sensing in optical NoCs by Zhou, Jun, Li, Mengquan, Guo, Pengxing, Liu, Weichen

    Published 2020
    “…In this paper, we focus on the tampering attacks on optical sampling during the thermal sensing process in ONoCs. …”
    Get full text
    Conference Paper
  12. 132

    Tamper detection and localization for Quranic text watermarking scheme based on hybrid technique by Alkhafaji, Ali A. R., Amir Sjarif, Nilam Nur, Shahidan, M. A., Mohd. Azmi, Nurulhuda Firdaus, Md. Sarkan, Haslina, Chuprat, Suriayati

    Published 2021
    “…The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC); thus, the location for tamper detection accuracy is low. The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida. …”
    Article
  13. 133
  14. 134
  15. 135
  16. 136
  17. 137
  18. 138
  19. 139

    An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document by Usop, Nur Alya Afikah, Izhar Hisham, Syifak, Abd Ghani, Aqilah, Mohd Zain, Jasni

    Published 2022
    “…Results show three types of attacks in PDF documentation managed to detect tamper location after being tampered.…”
    Get full text
    Article
  20. 140

    Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function by Muhammad Alif Aiman, Abd Samad

    Published 2023
    “…The tamper of the digital image can affect the security aspect in which it authenticates the image that has been tampered as legitimate which can cause damage or data stolen. …”
    Get full text
    Undergraduates Project Papers