-
141
A cycle-level recovery method for embedded processor against HT tamper
Published 2023-06-01“…However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against HT tamper is proposed, which builds two hardware-implementation units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. …”
Get full text
Article -
142
PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion
Published 2022-02-01“…We here propose a physical security system that can protect data from unauthorized access when the computer chassis is opened or tampered with. Sensor switches monitor the chassis status at all times and upload event logs to a cloud server for remote monitoring. …”
Get full text
Article -
143
UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence
Published 2013-12-01“…Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. …”
Get full text
Article -
144
Low scaling factor Seam Carving tamper detection algorithm with hybrid attention
Published 2024-06-01“…A seam carving tamper detection algorithm integrated with hybrid attention mechanism is proposed. …”
Get full text
Article -
145
Passive forensic based on spatio-temporal localization of video object removal tampering
Published 2020-07-01Subjects: “…video object removal tampering…”
Get full text
Article -
146
Genes involved in systemic and arterial bed dependent atherosclerosis--Tampere Vascular study.
Published 2012-01-01“…METHODOLOGY/PRINCIPAL FINDINGS: We characterized the genes generally involved in human advanced atherosclerotic (AHA type V-VI) plaques in carotid and femoral arteries as well as aortas from 24 subjects of Tampere Vascular study and compared the results to non-atherosclerotic internal thoracic arteries (n=6) using genome-wide expression array and QRT-PCR. …”
Get full text
Article -
147
Pseudo-siamese network image tampering localization model based on reinforced samples
Published 2024-02-01Subjects: Get full text
Article -
148
Pseudo-siamese network image tampering localization model based on reinforced samples
Published 2024-02-01Subjects: Get full text
Article -
149
A Robust Image Tampering Detection Method Based on Maximum Entropy Criteria
Published 2015-12-01Subjects: “…image tampering detection…”
Get full text
Article -
150
EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System
Published 2021-05-01“…In this work, we present a tamper-resistant log system through the use of a blockchain. …”
Get full text
Article -
151
Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag
Published 2013-04-01Subjects: Get full text
Article -
152
Detection and Recovery of Higher Tampered Images Using Novel Feature and Compression Strategy
Published 2021-01-01Subjects: “…Tampered image…”
Get full text
Article -
153
Passive forensic based on spatio-temporal localization of video object removal tampering
Published 2020-07-01Subjects: “…video object removal tampering;spatio-temporal localization;video passive forensic;object detection based on 3D convolution…”
Get full text
Article -
154
Changes over time in mental health symptoms among adolescents in Tampere, Finland
Published 2021-01-01Get full text
Article -
155
Mitigation of tampering attacks for MR-based thermal sensing in optical NoCs
Published 2020“…In this paper, we focus on the tampering attacks on optical sampling during the thermal sensing process in ONoCs. …”
Get full text
Conference Paper -
156
Opetusalan järjestöt koulutusdiskurssien pelikentällä. Arvosteltu teos: Mirka Räisänen 2014. Opettajat ja koulutuspolitiikka. Opetusalan ammattijärjestö ja Demokraattiset koulutyöntekijät -yhdistys peruskoulukauden koulutuspolitiikassa. Tampere: Tampere University Press. 294 s.
Published 2014-09-01Get full text
Article -
157
-
158
-
159
-
160