-
981
Development of a video tampering dataset for forensic investigation
Published 2016“…Forgery is an act of modifying a document, product, image or video, among other media. …”
Article -
982
Cryptanalysis and improvement of'a secure authentication scheme for telecare medical information system' with nonce verification
Published 2016“…In this study, we prove that authentication scheme of Wu et al. is still vulnerable to impersonation attack, offline password guessing attack, forgery attack and many other attacks. Moreover, number of performance and verification issues are also outlined in the authentication scheme of Wu et al. …”
Article -
983
Finger-vein biometric identification using convolutional neural network
Published 2016“…This also makes finger-vein biometrics a more secure alternative without being susceptible to forgery, damage, or change with time. In conventional finger-vein recognition methods, complex image processing is required to remove noise and extract and enhance the features before the image classification can be performed in order to achieve high performance accuracy. …”
Article -
984
Data anonymization using pseudonym system to preserve data privacy
Published 2020“…In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. …”
Get full text
Article -
985
The proved traditional contradictions in "Behar al-Anwar"
Published 2009-06-01“…However one of the issues concerning <br /> these traditions is the contradictions that is seen between different sets of <br /> hadiths. this deficiency is the result of many events in the history of hadith <br /> narration of which the following can be mentioned: hadith forgery, narrating <br /> the meaning of the hadith,loss of its context, weakness of memories and <br /> perception of some of the narrators, alteration and distortion and <br /> dissimulation. …”
Get full text
Article -
986
Non-Volatile Terpenoids and Lipophilic Flavonoids from <i>Achillea erba-rotta</i> Subsp. <i>moschata</i> (Wulfen) I. Richardson
Published 2023-01-01“…As a consequence, its authentication in aromatized products is impossible beyond sensory analysis allowing forgery. To address these issues, we phytochemically characterized a sample of musk yarrow from the Italian Eastern Alps, identifying, in addition to widespread phytochemicals (taraxasterol, apigenin), the guaianolides <b>3</b>, <b>8</b>, <b>9</b>; the seco-caryophyllane <b>6</b>; and the polymethoxylated lipophilic flavonoids <b>1</b>, <b>4</b>, and <b>5</b>. …”
Get full text
Article -
987
Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage
Published 2019-01-01“…The underlying scheme of the CAPDP is based on a modified RSA-based cryptographic accumulator that has the following advantages: 1) it allows the data owner to perform an unlimited number of data integrity checks; 2) it supports data dynamics; 3) it is efficient in terms of communication, computation and storage costs for both the data owner and the cloud storage provider; 4) the verification operation in the proposed scheme is independent of the number of blocks being verified; 5) it minimizes the burden and cost of the verification process on the data owner's side, enabling verification to be performed even on low-power devices; and 6) it prevents tag forgery, data deletion, replacement, and data leakage attacks and detects replay attacks. …”
Get full text
Article -
988
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform
Published 2023-03-01“…We also propose novel existential forgery attacks targeting deterministic and probabilistic signing procedure of Dilithium, followed by a novel verification bypass attack targeting its verification procedure. …”
Get full text
Article -
989
СЕЛЯНСТВО ТА ФАЛЬШИВОМОНЕТНИЦТВО В РОСІЙСЬКІЙ ТА АВСТРО-УГОРСЬКІЙ ІМПЕРІЯХ У ХІХ-ХХ СТ
Published 2020-08-01“…The purpose of the study is to determine the role of the peasantry in the processes associated with the forgery and sale of counterfeit money, based on previously unpublished archival sources and newspapers. …”
Get full text
Article -
990
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01“…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
Get full text
Article -
991
Diversity of Physicians’ Handwriting and Name Stamp in Chemotherapy Prescriptions: Potential Target for Fraud
Published 2018-02-01“…Backgrounds: Verification and authentication of the paper-based handwritten prescriptions is of great importance for antineoplastic medications that are good targets for forgery and fraud. Pharmacists usually investigate handwriting, signature and name stamp of prescribers to verify prescriptions in Iran. …”
Get full text
Article -
992
Discursive strategies for managing coronavirus fake news (rumors) by analyzing some pages in Telegram
Published 2022-09-01“…Rumors, like fraud and forgery, manipulate the system of fact-finding and cause the material content of truth to be replaced by the material of false content in the semantic process. …”
Get full text
Article -
993
EEG Topography Amplification Using FastGAN-ASP Method
Published 2023-12-01“…As a unique information factor, they are correlated with the genetic information of the subjects, exhibiting robustness against forgery. The development of biometric identity recognition based on EEG signals has significantly improved the security and accuracy of biometric recognition. …”
Get full text
Article -
994
Leveraging Blockchain for Scaffolding Work Management in Construction
Published 2022-01-01“…However, managing information of the scaffolding work process remains challenging in forgery risk and manual verification. Blockchain has been widely introduced as an accountable and efficient information management solution. …”
Get full text
Article -
995
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0
Published 2020-01-01“…All the messages exchanged are secured to prevent unauthorized access to information and preventing against forgery, replay, modification, impersonation and man-in-the-middle attacks, etc. …”
Get full text
Article -
996
書與烏托邦 The Book and Utopia
Published 2009-12-01“…Generally speaking, in Utopia, the book’s destiny is burning, mutilation, abandonment, forgery, customization, instrumentalization, and so on. …”
Get full text
Article -
997
Tobolsk Governorate Map of 1806: a sourse for searching Ermak’s grave or falsification of its author?
Published 2018-09-01“…In addition, there is no proof for suppositions about Filimonov’s grabbing habit and the disclosure of the forgery back in the 19th century. Archaeological excavations conducted on the site of the alleged grave of Ermak have failed to confirm the statement that local residents just pointed to V. …”
Get full text
Article -
998
Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment
Published 2018-01-01“…The security analysis shows that the scheme can satisfy auditing correctness, support data privacy protection, resist forgery attack, and replay attack. The performance analysis shows that, compared with the existing scheme, the scheme reduces the time cost of data integrity auditing and dynamic updating.…”
Get full text
Article -
999
Evaluating the effectiveness of student-record systems in conflict-affected universities in northwest Syria relative to student transition and mobility
Published 2022-01-01“…In a world where robust efficient digitised systems are central international recognition, many students still favoured hardcopy documents, not least as a requirement of employment to help mitigate forgery. Hardcopy systems did not provide students with direct access to essential documentation, creating delays and costs, and the need for in-person transaction in an area of continued insecurity with Government universities actively obstructing transition to non-government universities. …”
Get full text
Article -
1000
Efficient and Secure Blockchain System for Digital Content Trading
Published 2021-01-01“…Blockchain is attracting attention as a new solution for problems such as illegal copying, profit distribution, and forgery and falsification in the digital content trading environment, which has become an essential asset in the information age. …”
Get full text
Article