-
901
Investigating the Solution to the Conflict between the Right News and the Weak Leads to Fame and Its Causes
Published 2024-02-01“…Sunnah, as the second source of religious knowledge after the Holy Qur'an, has experienced events such as forgery, distortion, and Taqiyyah, etc., during its lifetime, which led to differences between narrations, and therefore its criticism and investigation is necessary. …”
Get full text
Article -
902
Practical Cube Attack against Nonce-Misused Ascon
Published 2022-12-01“…Our cryptanalysis is a conditional cube attack that is capable of recovering the full capacity in practical time; but for Ascon-128, its extension to a key recovery or a forgery is still an open question. First, a careful analysis of the maximum-degree terms in the algebraic normal form of the Ascon permutation allows us to derive linear equations in half of the capacity bits given enough cube sums of dimension 32. …”
Get full text
Article -
903
Problematic issues related to forensic examination of written language and handwriting in pre-trial investigation
Published 2023-12-01“…The article investigates the peculiarities of forensic methods of examination of written language and handwriting objects to be taken into account by officials who, in particular, conduct pre-trial investigation of criminal offences committed with the use of ordinary or forged written documents, handwriting forgery, and other criminal methods of their use with a view to qualitative preparation and conduct of relevant handwriting and authenticity examinations. …”
Get full text
Article -
904
Attack and protection schemes on fabric isomorphic crosschain systems
Published 2022-01-01“…Based on the principles, we discover and define five new crosschain attacks, including crosschain integer overflow attack, crosschain transaction forgery attack, crosschain transaction replay attack, crosschain transaction sequence attack, and crosschain routing attack. …”
Get full text
Article -
905
Digital signature schemes with strong existential unforgeability [version 1; peer review: 2 approved]
Published 2021-09-01“…In our review, we consider the security of existing DSS that fit our criterion in the sEUF-CMA model; our criterion is simple as we only require the DSS to be at least secure against the minimum of existential forgery. Our findings are categorized into two classes: the direct and indirect classes of sEUF-CMA. …”
Get full text
Article -
906
A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments
Published 2020-07-01“…However, in CLS, security threats, such as public key replacement attacks and signature forgery by the malicious key generation center (KGC), may occur. …”
Get full text
Article -
907
A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm
Published 2025-02-01“…The security analysis also shows that the proposed scheme is secure and reliable, and can resist a variety of attacks such as collusion attacks, man-in-the-middle attacks, and forgery attacks.…”
Get full text
Article -
908
Marco Polo, Nicknamed the Million, and His “Book on the Diversity of the World”
Published 2017-09-01“…We have raised the question of the participation of Polo in the printing of paper money by Gaykhatu. We have proved the forgery of maps which were formerly attributed to Marco Polo.…”
Get full text
Article -
909
Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?
Published 2022-05-01“…Finally, we verify whether a method based on the Photo-Response Non-Uniformity (PRNU) technique, which is usually used in digital forensic or image forgery detection activities, can be successfully used as a watermarking approach for authorship attribution and verification of pictures on SNs. …”
Get full text
Article -
910
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01“…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
Get full text
Article -
911
AREAS OF ACTIVITIES OF THE JUSTICE BODIES OF SOVIET UKRAINE IN THE 1920’S IN THE FIELD OF LAW ENFORCEMENT
Published 2022-03-01“…It was discovered that this category of crimes included: appropriation and embezzlement, bribery, abuse of power, forgery, negligence, improper exercise of authority, unlawful deprivation of liberty, inaction of the authorities, provocation of bribes, disruption of the apparatus, unjust decisions, authority misuse, discrediting the government, mismanagement, failure to provide information, etc. …”
Get full text
Article -
912
Developing a blockchain-based digitally secured model for the educational sector in Saudi Arabia toward digital transformation
Published 2022-09-01“…In order to avoid any document fraud and forgery, along with the ease of verification of academic records and educational documents for the students. …”
Get full text
Article -
913
Indonesian Dentists’ Perception of the Use of Teledentistry
Published 2022-10-01“…Nevertheless, most of the dentists had concerns about teledentistry in terms of digital forgery concern (74.2%) and technical incompatibility (71.8%). …”
Get full text
Article -
914
CNN with Batch Normalization Adjustment for Offline Hand-written Signature Genuine Verification
Published 2023-02-01“…Signature genuine verifications of offline hand-written signatures are critical for preventing forgery and fraud. With the growth of protecting personal identity and preventing fraud, the demand for an automatic system for signature verification is high. …”
Get full text
Article -
915
Ensemble Networks for User Recognition in Various Situations Based on Electrocardiogram
Published 2020-01-01“…Research on electrocardiogram (ECG) signals has been actively undertaken to assess their value as a next generation user recognition technology, because they require no stimulation and are robust against forgery and modification. However, even within the same user, the heart rate and waveform of ECG signals will vary depending on physical activity, mental effects, and measurement time. …”
Get full text
Article -
916
A Blockchain-Applied Personal Health Record Application: Development and User Experience
Published 2022-02-01“…The system transmits the part corresponding to the patient’s personal information off-chain and prevents data forgery and falsification by storing encrypted data on-chain. …”
Get full text
Article -
917
Spatio-Temporal Analysis of Urban Crime Pattern and its Implication for Abuja Municipal Area Council, Nigeria
Published 2017-12-01“…The results indicated that the main types of crime committed were theft and house breaking (42.9%), followed by assault (12.4%), mischief (11.3%), forgery (10.5%), car snatching (9.05%), armed robbery (8.5%), trespass (5.2%) and culpable homicide (0.2%). …”
Get full text
Article -
918
Cryptanalysis of Rocca and Feasibility of Its Security Claim
Published 2022-09-01“…In particular, the security claim regarding key-recovery attacks allows an attacker to obtain multiple forgeries through the decryption oracle. In this paper, we first present a full key-recovery attack on Rocca. …”
Get full text
Article -
919
A propaganda document in support of the 19th century Caliphate of Ḥamdallāhi: Nūḥ b. al-Ṭāhir al-Fulānī’s “Letter on the appearance of the twelfth caliph” (Risāla fī ẓuhūr al-khalī...
Published 2016-12-01“…This document, briefly introduced by Felix Dubois in the late 19th century, has been neglected by scholars, who have discarded it because it includes an obvious forgery. The letter comprises extensive quotes from the Tārīkh al-Fattāsh, allegedly written in the early 16th century by the Timbuktu-based scholar Maḥmūd Kaʻti but actually composed by Nūḥ b. al-Ṭāhir himself. …”
Get full text
Article -
920
Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks
Published 2021-11-01“…The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.…”
Get full text
Article