Showing 981 - 1,000 results of 1,172 for search '"forgery"', query time: 0.16s Refine Results
  1. 981

    Development of a video tampering dataset for forensic investigation by Al-Sanjary, Omar Ismael, Ahmed, Ahmed Abdullah, Sulong, Ghazali

    Published 2016
    “…Forgery is an act of modifying a document, product, image or video, among other media. …”
    Article
  2. 982

    Cryptanalysis and improvement of'a secure authentication scheme for telecare medical information system' with nonce verification by Siddiqui, Z., Abdullah, A. H., Khan, M. K., Alghamdi, A. S.

    Published 2016
    “…In this study, we prove that authentication scheme of Wu et al. is still vulnerable to impersonation attack, offline password guessing attack, forgery attack and many other attacks. Moreover, number of performance and verification issues are also outlined in the authentication scheme of Wu et al. …”
    Article
  3. 983

    Finger-vein biometric identification using convolutional neural network by Ahmad Radzi, S., Khalil Hani, M., Bakhteri, R.

    Published 2016
    “…This also makes finger-vein biometrics a more secure alternative without being susceptible to forgery, damage, or change with time. In conventional finger-vein recognition methods, complex image processing is required to remove noise and extract and enhance the features before the image classification can be performed in order to achieve high performance accuracy. …”
    Article
  4. 984

    Data anonymization using pseudonym system to preserve data privacy by Razak, S. A., Nazari, N. H. M., Al-Dhaqm, A.

    Published 2020
    “…In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. …”
    Get full text
    Article
  5. 985

    The proved traditional contradictions in "Behar al-Anwar" by Abdolhadi Faqihizadeh, Zahra khurami Ejlali

    Published 2009-06-01
    “…However one of the issues concerning <br /> these traditions is the contradictions that is seen between different sets of <br /> hadiths. this deficiency is the result of many events in the history of hadith <br /> narration of which the following can be mentioned: hadith forgery, narrating <br /> the meaning of the hadith,loss of its context, weakness of memories and <br /> perception of some of the narrators, alteration and distortion and <br /> dissimulation. …”
    Get full text
    Article
  6. 986

    Non-Volatile Terpenoids and Lipophilic Flavonoids from <i>Achillea erba-rotta</i> Subsp. <i>moschata</i> (Wulfen) I. Richardson by Stefano Salamone, Nicola Aiello, Pietro Fusani, Antonella Rosa, Mariella Nieddu, Giovanni Appendino, Federica Pollastro

    Published 2023-01-01
    “…As a consequence, its authentication in aromatized products is impossible beyond sensory analysis allowing forgery. To address these issues, we phytochemically characterized a sample of musk yarrow from the Italian Eastern Alps, identifying, in addition to widespread phytochemicals (taraxasterol, apigenin), the guaianolides <b>3</b>, <b>8</b>, <b>9</b>; the seco-caryophyllane <b>6</b>; and the polymethoxylated lipophilic flavonoids <b>1</b>, <b>4</b>, and <b>5</b>. …”
    Get full text
    Article
  7. 987

    Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage by Walid I. Khedr, Heba M. Khater, Ehab R. Mohamed

    Published 2019-01-01
    “…The underlying scheme of the CAPDP is based on a modified RSA-based cryptographic accumulator that has the following advantages: 1) it allows the data owner to perform an unlimited number of data integrity checks; 2) it supports data dynamics; 3) it is efficient in terms of communication, computation and storage costs for both the data owner and the cloud storage provider; 4) the verification operation in the proposed scheme is independent of the number of blocks being verified; 5) it minimizes the burden and cost of the verification process on the data owner's side, enabling verification to be performed even on low-power devices; and 6) it prevents tag forgery, data deletion, replacement, and data leakage attacks and detects replay attacks. …”
    Get full text
    Article
  8. 988

    Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform by Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay

    Published 2023-03-01
    “…We also propose novel existential forgery attacks targeting deterministic and probabilistic signing procedure of Dilithium, followed by a novel verification bypass attack targeting its verification procedure. …”
    Get full text
    Article
  9. 989

    СЕЛЯНСТВО ТА ФАЛЬШИВОМОНЕТНИЦТВО В РОСІЙСЬКІЙ ТА АВСТРО-УГОРСЬКІЙ ІМПЕРІЯХ У ХІХ-ХХ СТ by А. С. А. С. Бойко-Гагарін

    Published 2020-08-01
    “…The purpose of the study is to determine the role of the peasantry in the processes associated with the forgery and sale of counterfeit money, based on previously unpublished archival sources and newspapers. …”
    Get full text
    Article
  10. 990

    Efficient and safe software defined network topology discovery protocol by Dong LI, Junqing YU, Yongpu GU, Pengcheng ZHAO

    Published 2023-12-01
    “…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
    Get full text
    Article
  11. 991

    Diversity of Physicians’ Handwriting and Name Stamp in Chemotherapy Prescriptions: Potential Target for Fraud by Asiyeh Amouei, Molouk Hadjibabaie, Ava Mansouri, Aarefeh Jafarzadeh kohneloo, Maryam Taghizadeh-Ghehi

    Published 2018-02-01
    “…Backgrounds: Verification and authentication of the paper-based handwritten prescriptions is of great importance for antineoplastic medications that are good targets for forgery and fraud. Pharmacists usually investigate handwriting, signature and name stamp of prescribers to verify prescriptions in Iran. …”
    Get full text
    Article
  12. 992

    Discursive strategies for managing coronavirus fake news (rumors) by analyzing some pages in Telegram by Mohammad Hatefi

    Published 2022-09-01
    “…Rumors, like fraud and forgery, manipulate the system of fact-finding and cause the material content of truth to be replaced by the material of false content in the semantic process. …”
    Get full text
    Article
  13. 993

    EEG Topography Amplification Using FastGAN-ASP Method by Min Zhao, Shuai Zhang, Xiuqing Mao, Lei Sun

    Published 2023-12-01
    “…As a unique information factor, they are correlated with the genetic information of the subjects, exhibiting robustness against forgery. The development of biometric identity recognition based on EEG signals has significantly improved the security and accuracy of biometric recognition. …”
    Get full text
    Article
  14. 994

    Leveraging Blockchain for Scaffolding Work Management in Construction by Jaehun Yang, Dongmin Lee, Chanwoo Baek, Chansik Park, Bao Quy Lan, Doyeop Lee

    Published 2022-01-01
    “…However, managing information of the scaffolding work process remains challenging in forgery risk and manual verification. Blockchain has been widely introduced as an accountable and efficient information management solution. …”
    Get full text
    Article
  15. 995

    Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0 by Gurjot Singh Gaba, Gulshan Kumar, Himanshu Monga, Tai-Hoon Kim, Madhusanka Liyanage, Pardeep Kumar

    Published 2020-01-01
    “…All the messages exchanged are secured to prevent unauthorized access to information and preventing against forgery, replay, modification, impersonation and man-in-the-middle attacks, etc. …”
    Get full text
    Article
  16. 996

    書與烏托邦 The Book and Utopia by Liyun Hu

    Published 2009-12-01
    “…Generally speaking, in Utopia, the book’s destiny is burning, mutilation, abandonment, forgery, customization, instrumentalization, and so on. …”
    Get full text
    Article
  17. 997

    Tobolsk Governorate Map of 1806: a sourse for searching Ermak’s grave or falsification of its author? by Adamov А.А.

    Published 2018-09-01
    “…In addition, there is no proof for suppositions about Filimonov’s grabbing habit and the disclosure of the forgery back in the 19th century. Archaeological excavations conducted on the site of the alleged grave of Ermak have failed to confirm the statement that local residents just pointed to V. …”
    Get full text
    Article
  18. 998

    Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment by Bilin Shao, Genqing Bian, Yue Wang, Shenghao Su, Cheng Guo

    Published 2018-01-01
    “…The security analysis shows that the scheme can satisfy auditing correctness, support data privacy protection, resist forgery attack, and replay attack. The performance analysis shows that, compared with the existing scheme, the scheme reduces the time cost of data integrity auditing and dynamic updating.…”
    Get full text
    Article
  19. 999

    Evaluating the effectiveness of student-record systems in conflict-affected universities in northwest Syria relative to student transition and mobility by Muhammed Assaf, Abdulkarim Lakmes, Mohamad Gazy Alobaidy, Feras Shabou, Wael Ahmad, Miassar Alhasan, Fuad Trayek, Leonie Ansems De Vries

    Published 2022-01-01
    “…In a world where robust efficient digitised systems are central international recognition, many students still favoured hardcopy documents, not least as a requirement of employment to help mitigate forgery. Hardcopy systems did not provide students with direct access to essential documentation, creating delays and costs, and the need for in-person transaction in an area of continued insecurity with Government universities actively obstructing transition to non-government universities. …”
    Get full text
    Article
  20. 1000

    Efficient and Secure Blockchain System for Digital Content Trading by Gabin Heo, Dana Yang, Inshil Doh, Kijoon Chae

    Published 2021-01-01
    “…Blockchain is attracting attention as a new solution for problems such as illegal copying, profit distribution, and forgery and falsification in the digital content trading environment, which has become an essential asset in the information age. …”
    Get full text
    Article