-
861
Digital signature schemes with strong existential unforgeability [version 1; peer review: 2 approved]
Published 2021-09-01“…In our review, we consider the security of existing DSS that fit our criterion in the sEUF-CMA model; our criterion is simple as we only require the DSS to be at least secure against the minimum of existential forgery. Our findings are categorized into two classes: the direct and indirect classes of sEUF-CMA. …”
Get full text
Article -
862
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments
Published 2020-07-01“…However, in CLS, security threats, such as public key replacement attacks and signature forgery by the malicious key generation center (KGC), may occur. …”
Get full text
Article -
863
A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm
Published 2025-02-01“…The security analysis also shows that the proposed scheme is secure and reliable, and can resist a variety of attacks such as collusion attacks, man-in-the-middle attacks, and forgery attacks.…”
Get full text
Article -
864
Marco Polo, Nicknamed the Million, and His “Book on the Diversity of the World”
Published 2017-09-01“…We have raised the question of the participation of Polo in the printing of paper money by Gaykhatu. We have proved the forgery of maps which were formerly attributed to Marco Polo.…”
Get full text
Article -
865
Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?
Published 2022-05-01“…Finally, we verify whether a method based on the Photo-Response Non-Uniformity (PRNU) technique, which is usually used in digital forensic or image forgery detection activities, can be successfully used as a watermarking approach for authorship attribution and verification of pictures on SNs. …”
Get full text
Article -
866
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01“…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
Get full text
Article -
867
AREAS OF ACTIVITIES OF THE JUSTICE BODIES OF SOVIET UKRAINE IN THE 1920’S IN THE FIELD OF LAW ENFORCEMENT
Published 2022-03-01“…It was discovered that this category of crimes included: appropriation and embezzlement, bribery, abuse of power, forgery, negligence, improper exercise of authority, unlawful deprivation of liberty, inaction of the authorities, provocation of bribes, disruption of the apparatus, unjust decisions, authority misuse, discrediting the government, mismanagement, failure to provide information, etc. …”
Get full text
Article -
868
Indonesian Dentists’ Perception of the Use of Teledentistry
Published 2022-10-01“…Nevertheless, most of the dentists had concerns about teledentistry in terms of digital forgery concern (74.2%) and technical incompatibility (71.8%). …”
Get full text
Article -
869
CNN with Batch Normalization Adjustment for Offline Hand-written Signature Genuine Verification
Published 2023-02-01“…Signature genuine verifications of offline hand-written signatures are critical for preventing forgery and fraud. With the growth of protecting personal identity and preventing fraud, the demand for an automatic system for signature verification is high. …”
Get full text
Article -
870
Ensemble Networks for User Recognition in Various Situations Based on Electrocardiogram
Published 2020-01-01“…Research on electrocardiogram (ECG) signals has been actively undertaken to assess their value as a next generation user recognition technology, because they require no stimulation and are robust against forgery and modification. However, even within the same user, the heart rate and waveform of ECG signals will vary depending on physical activity, mental effects, and measurement time. …”
Get full text
Article -
871
A Blockchain-Applied Personal Health Record Application: Development and User Experience
Published 2022-02-01“…The system transmits the part corresponding to the patient’s personal information off-chain and prevents data forgery and falsification by storing encrypted data on-chain. …”
Get full text
Article -
872
Cryptanalysis of Rocca and Feasibility of Its Security Claim
Published 2022-09-01“…In particular, the security claim regarding key-recovery attacks allows an attacker to obtain multiple forgeries through the decryption oracle. In this paper, we first present a full key-recovery attack on Rocca. …”
Get full text
Article -
873
A propaganda document in support of the 19th century Caliphate of Ḥamdallāhi: Nūḥ b. al-Ṭāhir al-Fulānī’s “Letter on the appearance of the twelfth caliph” (Risāla fī ẓuhūr al-khalī...
Published 2016-12-01“…This document, briefly introduced by Felix Dubois in the late 19th century, has been neglected by scholars, who have discarded it because it includes an obvious forgery. The letter comprises extensive quotes from the Tārīkh al-Fattāsh, allegedly written in the early 16th century by the Timbuktu-based scholar Maḥmūd Kaʻti but actually composed by Nūḥ b. al-Ṭāhir himself. …”
Get full text
Article -
874
Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks
Published 2021-11-01“…The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.…”
Get full text
Article -
875
Evaluation of problems arising in emergency services from the perspectives of medical and criminal law: The example of Türkiye
Published 2024-11-01“…The crimes attributed to these professionals vary but primarily include involuntary manslaughter, misuse of public duty, forgery of documents, and reckless injury. Discussion: In Türkiye, there is a notable prevalence of investigations conducted in emergency services and criminal cases involving healthcare professionals in this field. …”
Get full text
Article -
876
Improvements in the randomness and security of digital currency using the photon sponge hash function through Maiorana–McFarland S-box replacement
Published 2024-10-01“…Trading digital currencies via the Internet may be vulnerable to theft and forgery due to the development of hacker programs. …”
Get full text
Article -
877
Application of Fuzzy Logic in a Secure Beacon–Based Guidance System for Public Transportation
Published 2022-09-01“…To defend the scheme against possible attacks based on beacon forgery or user tracking, the proposal includes different forms of authentication for data sent from beacons and data sent from the mobile application. …”
Get full text
Article -
878
Application of expert opinion in investigation and proof of criminal offences against justice
Published 2024-12-01“…Another typical method used in the investigation of criminal offences against justice is the technical examination of a document, which is aimed at confirming/refuting the fact of its forgery. The author believes that further research on the issues raised should be aimed at identifying typical mistakes made by the inquiry and investigation authorities which affect the ability to solve expert tasks in this category of criminal offences.…”
Get full text
Article -
879
Deepfake detection method based on patch-wise lighting inconsistency
Published 2023-02-01“…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
Get full text
Article -
880
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System
Published 2023-12-01“…An attacker may attempt to compromise the security, such as forgery, replay, and impersonation attacks. To ensure secure communication, various authentication solutions have been introduced for TMIS. …”
Get full text
Article