Showing 901 - 920 results of 1,102 for search '"forgery"', query time: 0.20s Refine Results
  1. 901

    Investigating the Solution to the Conflict between the Right News and the Weak Leads to Fame and Its Causes by Sayyid Ali Delbari, Ali Asadian, Sayyid mahday Sayyidi, Murteza Pazhoohandeh

    Published 2024-02-01
    “…Sunnah, as the second source of religious knowledge after the Holy Qur'an, has experienced events such as forgery, distortion, and Taqiyyah, etc., during its lifetime, which led to differences between narrations, and therefore its criticism and investigation is necessary. …”
    Get full text
    Article
  2. 902

    Practical Cube Attack against Nonce-Misused Ascon by Jules Baudrin, Anne Canteaut, Léo Perrin

    Published 2022-12-01
    “…Our cryptanalysis is a conditional cube attack that is capable of recovering the full capacity in practical time; but for Ascon-128, its extension to a key recovery or a forgery is still an open question. First, a careful analysis of the maximum-degree terms in the algebraic normal form of the Ascon permutation allows us to derive linear equations in half of the capacity bits given enough cube sums of dimension 32. …”
    Get full text
    Article
  3. 903

    Problematic issues related to forensic examination of written language and handwriting in pre-trial investigation by O. O. Yukhno, H. V. Smirnov

    Published 2023-12-01
    “…The article investigates the peculiarities of forensic methods of examination of written language and handwriting objects to be taken into account by officials who, in particular, conduct pre-trial investigation of criminal offences committed with the use of ordinary or forged written documents, handwriting forgery, and other criminal methods of their use with a view to qualitative preparation and conduct of relevant handwriting and authenticity examinations. …”
    Get full text
    Article
  4. 904

    Attack and protection schemes on fabric isomorphic crosschain systems by Zhuo Lv, Di Wu, Wen Yang, Li Duan

    Published 2022-01-01
    “…Based on the principles, we discover and define five new crosschain attacks, including crosschain integer overflow attack, crosschain transaction forgery attack, crosschain transaction replay attack, crosschain transaction sequence attack, and crosschain routing attack. …”
    Get full text
    Article
  5. 905

    Digital signature schemes with strong existential unforgeability [version 1; peer review: 2 approved] by Jason Chia, Ji-Jian Chin, Sook-Chin Yip

    Published 2021-09-01
    “…In our review, we consider the security of existing DSS that fit our criterion in the sEUF-CMA model; our criterion is simple as we only require the DSS to be at least secure against the minimum of existential forgery. Our findings are categorized into two classes: the direct and indirect classes of sEUF-CMA. …”
    Get full text
    Article
  6. 906

    A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments by Dae-Hwi Lee, Kangbin Yim, Im-Yeong Lee

    Published 2020-07-01
    “…However, in CLS, security threats, such as public key replacement attacks and signature forgery by the malicious key generation center (KGC), may occur. …”
    Get full text
    Article
  7. 907

    A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm by Pengbin Han, Aina Sui, Jiang Wu

    Published 2025-02-01
    “…The security analysis also shows that the proposed scheme is secure and reliable, and can resist a variety of attacks such as collusion attacks, man-in-the-middle attacks, and forgery attacks.…”
    Get full text
    Article
  8. 908

    Marco Polo, Nicknamed the Million, and His “Book on the Diversity of the World” by A.N. Garkavets

    Published 2017-09-01
    “…We have raised the question of the participation of Polo in the printing of paper money by Gaykhatu. We have proved the forgery of maps which were formerly attributed to Marco Polo.…”
    Get full text
    Article
  9. 909

    Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself? by Flavio Bertini, Rajesh Sharma, Danilo Montesi

    Published 2022-05-01
    “…Finally, we verify whether a method based on the Photo-Response Non-Uniformity (PRNU) technique, which is usually used in digital forensic or image forgery detection activities, can be successfully used as a watermarking approach for authorship attribution and verification of pictures on SNs. …”
    Get full text
    Article
  10. 910

    Efficient and safe software defined network topology discovery protocol by Dong LI, Junqing YU, Yongpu GU, Pengcheng ZHAO

    Published 2023-12-01
    “…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
    Get full text
    Article
  11. 911

    AREAS OF ACTIVITIES OF THE JUSTICE BODIES OF SOVIET UKRAINE IN THE 1920’S IN THE FIELD OF LAW ENFORCEMENT by Anton V. Zhydovtsev

    Published 2022-03-01
    “…It was discovered that this category of crimes included: appropriation and embezzlement, bribery, abuse of power, forgery, negligence, improper exercise of authority, unlawful deprivation of liberty, inaction of the authorities, provocation of bribes, disruption of the apparatus, unjust decisions, authority misuse, discrediting the government, mismanagement, failure to provide information, etc. …”
    Get full text
    Article
  12. 912

    Developing a blockchain-based digitally secured model for the educational sector in Saudi Arabia toward digital transformation by Someah Alangari, Saeed M. Alshahrani, Nayyar Ahmed Khan, Abdulrahman Abdullah Alghamdi, Jameel Almalki, Waleed Al Shehri

    Published 2022-09-01
    “…In order to avoid any document fraud and forgery, along with the ease of verification of academic records and educational documents for the students. …”
    Get full text
    Article
  13. 913

    Indonesian Dentists’ Perception of the Use of Teledentistry by Anandina Irmagita Soegyanto, Yuniardini Septorini Wimardhani, Diah Ayu Maharani, Marc Tennant

    Published 2022-10-01
    “…Nevertheless, most of the dentists had concerns about teledentistry in terms of digital forgery concern (74.2%) and technical incompatibility (71.8%). …”
    Get full text
    Article
  14. 914

    CNN with Batch Normalization Adjustment for Offline Hand-written Signature Genuine Verification by Wifda Muna Fatihia, Arna Fariza, Tita Karlita

    Published 2023-02-01
    “…Signature genuine verifications of offline hand-written signatures are critical for preventing forgery and fraud. With the growth of protecting personal identity and preventing fraud, the demand for an automatic system for signature verification is high. …”
    Get full text
    Article
  15. 915

    Ensemble Networks for User Recognition in Various Situations Based on Electrocardiogram by Min-Gu Kim, Chang Choi, Sung Bum Pan

    Published 2020-01-01
    “…Research on electrocardiogram (ECG) signals has been actively undertaken to assess their value as a next generation user recognition technology, because they require no stimulation and are robust against forgery and modification. However, even within the same user, the heart rate and waveform of ECG signals will vary depending on physical activity, mental effects, and measurement time. …”
    Get full text
    Article
  16. 916

    A Blockchain-Applied Personal Health Record Application: Development and User Experience by Ji Woong Kim, Su Jin Kim, Won Chul Cha, Taerim Kim

    Published 2022-02-01
    “…The system transmits the part corresponding to the patient’s personal information off-chain and prevents data forgery and falsification by storing encrypted data on-chain. …”
    Get full text
    Article
  17. 917

    Spatio-Temporal Analysis of Urban Crime Pattern and its Implication for Abuja Municipal Area Council, Nigeria by Taiye Oluwafemi Adewuyi, Patrick Ali Eneji, Anthonia Silas Baduku, Emmanuel Ajayi Olofin

    Published 2017-12-01
    “…The results indicated that the main types of crime committed were theft and house breaking (42.9%), followed by assault (12.4%), mischief (11.3%), forgery (10.5%), car snatching (9.05%), armed robbery (8.5%), trespass (5.2%) and culpable homicide (0.2%). …”
    Get full text
    Article
  18. 918

    Cryptanalysis of Rocca and Feasibility of Its Security Claim by Akinori Hosoyamada, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Mimematsu, Ferdinand Sibleyras, Yosuke Todo

    Published 2022-09-01
    “…In particular, the security claim regarding key-recovery attacks allows an attacker to obtain multiple forgeries through the decryption oracle. In this paper, we first present a full key-recovery attack on Rocca. …”
    Get full text
    Article
  19. 919

    A propaganda document in support of the 19th century Caliphate of Ḥamdallāhi: Nūḥ b. al-Ṭāhir al-Fulānī’s “Letter on the appearance of the twelfth caliph” (Risāla fī ẓuhūr al-khalī... by Mauro Nobili

    Published 2016-12-01
    “…This document, briefly introduced by Felix Dubois in the late 19th century, has been neglected by scholars, who have discarded it because it includes an obvious forgery. The letter comprises extensive quotes from the Tārīkh al-Fattāsh, allegedly written in the early 16th century by the Timbuktu-based scholar Maḥmūd Kaʻti but actually composed by Nūḥ b. al-Ṭāhir himself. …”
    Get full text
    Article
  20. 920

    Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks by Zheng Zuo, Shichun Yang, Bin Ma, Bosong Zou, Yaoguang Cao, Qiangwei Li, Sida Zhou, Jichong Li

    Published 2021-11-01
    “…The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.…”
    Get full text
    Article