-
1041
A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
Published 2019-09-01“…However, in existing authentication schemes, an adversary may capture private user data to create a forgery problem. Also, another issue is the high computation cost. …”
Get full text
Article -
1042
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Published 2020-09-01“…With the refined model, we show a 338-round differential with probability 2−62.68 that leads to a forgery attack breaking 64-bit security. This implies that the security margin of TinyJAMBU with respect to the number of unattacked rounds is approximately 12%. …”
Get full text
Article -
1043
First Demonstration of Calibrated Color Imaging by the CAOS Camera
Published 2021-11-01“…Applications for such a hybrid camera includes still photography imaging, especially for quantitative imaging of biological samples, valuable artworks and archaeological artefacts that require authentic color data generation for reliable medical decisions as well as forgery preventing verifications.…”
Get full text
Article -
1044
La desaparición de lo real o el éxtasis de la comunicación
Published 2013-01-01“…We will emphasize Baudrillard’s theory according to which societies are governed by the principle of simulation, which takes precedence over the principle of production of the industrial era and the beginning of forgery which claimed the classical period. The third-order simulacra are imposed: the system, according to Baudrillard, begins to spin. …”
Get full text
Article -
1045
A security scheme for intelligent substation communications considering real-time performance
Published 2019-01-01“…Tampering, forgery and theft of the measurement and control messages in a smart grid could cause one breakdown in the power system. …”
Get full text
Article -
1046
The Correlation Analysis of the Interrelation between the Surface Optical Characteristics of Protected Paper and Characteristics of Imprints
Published 2016-12-01“…Done correlation analysis of interconnection between the characteristics of protected against forgery paper (roughness parameters and fractal dimension) and optical characteristics of imprints (optical density, color difference), which enabled the prediction of the optical characteristics of impressions and taking into account the differences of optical characteristics in watermark areas and outside them. …”
Get full text
Article -
1047
A Comprehensive Tensor Framework for the Clustering of Hyperspectral Paper Data With an Application to Forensic Document Analysis
Published 2022-01-01“…In forensic document analysis, the authenticity of a document must be properly checked in the context of suspected forgery. Hyperspectral Imaging (HSI) is a non-invasive way of detecting fraudulent papers in a multipage document. …”
Get full text
Article -
1048
An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals
Published 2018-01-01“…The electroencephalogram (EEG) signal represents a subject’s specific brain activity patterns and is considered as an ideal biometric given its superior forgery prevention. However, the accuracy and stability of the current EEG-based person authentication systems are still unsatisfactory in practical application. …”
Get full text
Article -
1049
Implementasi Teknik Watermarking menggunakan FFT dan Spread Spectrum Watermark pada Data Audio Digital
Published 2018-05-01“…Kata kunci: Audio watermarking, Copyright Protection, Fast Fourier Transform, Spektrum magnitude ABSTRACT The use of technology and internet has grown rapidly that causes a lot of forgery and illegal proliferation of digital data. …”
Get full text
Article -
1050
ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing
Published 2023-03-01“…This research also satisfies privacy and security criteria, such as conditional privacy preservation, unlinkability, traceability, revocability, and resistance to security threats, as well as others (e.g., modify attacks, forgery attacks, replay attacks, and man-in-the-middle attacks). …”
Get full text
Article -
1051
Plasmonic nanopillar arrays encoded with multiplex molecular information for anti-counterfeiting applications
Published 2020“…This feature combined with the high ∼17 000 pillars per inch (ppi) information density of the platform make its use extremely effective against counterfeiting and forgery. In summary, our encoding platform enables high security, large information density and low-error decoding.…”
Get full text
Journal Article -
1052
LPPA : lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks
Published 2021“…In addition, our proposed scheme can withstand a lot of protocol attacks including interior forgery attacks and DoS attacks and achieve identity privacy protection and group member update without sacrificing the efficiency. …”
Get full text
Journal Article -
1053
Detection & prevention of vulnerabilities in web applications
Published 2016“…They belong to various categories, SQL Injection, Denial of Service (DoS), Cross-site Request Forgery (CSRF), Remote File Inclusion (RFI), Information Leakage, HTTP Response Splitting (CRLF), Code Injection and Directory Traversal. …”
Get full text
Thesis -
1054
Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence /
Published 2022Get full text
software, multimedia -
1055
REDUCING THE RISKS OF ILLICIT TRAFFICKING IN INDUSTRIAL PRODUCTS TO ACHIEVE SUSTAINABLE DEVELOPMENT GOALS
Published 2022-08-01“…In this regard, it is necessary to analyze the risks of existing mechanisms of protection against counterfeit products and develop measures to reduce them.The object of research in this article is labeling, which is the application of a special DataMatrix code to the packaging and the entry of this unit of goods into the database.The purpose of the article is to develop recommendations on the use of additional visual control tools on the material carriers of the DataMatrix code, protected from forgery, and to assess the probability of the level of risk reduction and the level of possible losses when using them.The novelty of this study was: identification and analysis of risks of possible threats to the security of the mandatory labeling system for various categories of goods; development of a risk register of possible threats to the security of the system with a grouping of qualitatively assessed and quantifiable risks; development and verification of a model for assessing the probability and possible losses for a group of quantifiable risks; assessment of the probability of risks and possible budget losses from non-payment of taxes and excise duties; assessment of the probability of risks and possible losses for a bona fide manufacturer and end user; formation of management measures aimed at reducing the likelihood of risks and reducing the consequences of the potential implementation of risks; assessment of the residual level of probability and exposure to risks when using additional means of visual control on the material carriers of the DataMatrix code; assessment of the residual level of probability and exposure to risks when using additional visual inspection tools on tangible media protected from counterfeiting in similar systems and Track&Trace marking systems implemented in foreign countries.The results obtained can be applied by federal executive authorities in the formation of state policy in the field of increasing the level of security of Russians, significantly reduce the amount of counterfeit and low-quality analogues, effectively combat smuggling, protect legal businesses and consumers, and also allow the state to increase tax collection.…”
Get full text
Article -
1056
Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption
Published 2018-01-01“…The proposed LinHAE guarantees the security against eavesdropping and forgery attacks, unlike homomorphic encryption alone that does not provide means to check whether the received signal at the drone side is authentic or compromised. …”
Get full text
Article -
1057
A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF
Published 2022-01-01“…However, we prove that their scheme suffers from forgery, ephemeral secret leakage, and session key disclosure attacks. …”
Get full text
Article -
1058
-
1059
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints
Published 2023-07-01“…Furthermore, it is demonstrated that ActiveGuard is robust against model fine‐tuning attack, pruning attack, and three types of fingerprint forgery attacks.…”
Get full text
Article -
1060
Vascular Auscultation of Carotid Artery: Towards Biometric Identification and Verification of Individuals
Published 2021-10-01“…However, they are vulnerable to tampering and forgery. Methods: The proposed approach uses blood flow sounds in the carotid artery as a source of biometric information. …”
Get full text
Article