Showing 1,041 - 1,060 results of 1,172 for search '"forgery"', query time: 0.17s Refine Results
  1. 1041

    A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems by Deebak B D, Fadi Al-Turjman, Leonardo Mostarda

    Published 2019-09-01
    “…However, in existing authentication schemes, an adversary may capture private user data to create a forgery problem. Also, another issue is the high computation cost. …”
    Get full text
    Article
  2. 1042

    On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis by Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang

    Published 2020-09-01
    “…With the refined model, we show a 338-round differential with probability 2−62.68 that leads to a forgery attack breaking 64-bit security. This implies that the security margin of TinyJAMBU with respect to the number of unattacked rounds is approximately 12%. …”
    Get full text
    Article
  3. 1043

    First Demonstration of Calibrated Color Imaging by the CAOS Camera by Nabeel A. Riza, Nazim Ashraf

    Published 2021-11-01
    “…Applications for such a hybrid camera includes still photography imaging, especially for quantitative imaging of biological samples, valuable artworks and archaeological artefacts that require authentic color data generation for reliable medical decisions as well as forgery preventing verifications.…”
    Get full text
    Article
  4. 1044

    La desaparición de lo real o el éxtasis de la comunicación

    Published 2013-01-01
    “…We will emphasize Baudrillard’s theory according to which societies are governed by the principle of simulation, which takes precedence over the principle of production of the industrial era and the beginning of forgery which claimed the classical period. The third-order simulacra are imposed: the system, according to Baudrillard, begins to spin. …”
    Get full text
    Article
  5. 1045

    A security scheme for intelligent substation communications considering real-time performance by Jie Zhang, Jun'e Li, Xiong Chen, Ming Ni, Ting Wang, Jianbo Luo

    Published 2019-01-01
    “…Tampering, forgery and theft of the measurement and control messages in a smart grid could cause one breakdown in the power system. …”
    Get full text
    Article
  6. 1046

    The Correlation Analysis of the Interrelation between the Surface Optical Characteristics of Protected Paper and Characteristics of Imprints by Сергій Євгенович Шейкін, Тетяна Юріївна Киричок, Тетяна Євгенівна Клименко, Надія Леонідівна Талімонова

    Published 2016-12-01
    “…Done correlation analysis of interconnection between the characteristics of protected against forgery paper (roughness parameters and fractal dimension) and optical characteristics of imprints (optical density, color difference), which enabled the prediction of the optical characteristics of impressions and taking into account the differences of optical characteristics in watermark areas and outside them. …”
    Get full text
    Article
  7. 1047

    A Comprehensive Tensor Framework for the Clustering of Hyperspectral Paper Data With an Application to Forensic Document Analysis by Jobin Francis, Baburaj Madathil, Sudhish N. George, Sony George

    Published 2022-01-01
    “…In forensic document analysis, the authenticity of a document must be properly checked in the context of suspected forgery. Hyperspectral Imaging (HSI) is a non-invasive way of detecting fraudulent papers in a multipage document. …”
    Get full text
    Article
  8. 1048

    An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals by Qunjian Wu, Ying Zeng, Chi Zhang, Li Tong, Bin Yan

    Published 2018-01-01
    “…The electroencephalogram (EEG) signal represents a subject’s specific brain activity patterns and is considered as an ideal biometric given its superior forgery prevention. However, the accuracy and stability of the current EEG-based person authentication systems are still unsatisfactory in practical application. …”
    Get full text
    Article
  9. 1049

    Implementasi Teknik Watermarking menggunakan FFT dan Spread Spectrum Watermark pada Data Audio Digital by HANNAN HARAHAP, GELAR BUDIMAN, LEDYA NOVAMIZANTI

    Published 2018-05-01
    “…Kata kunci: Audio watermarking, Copyright Protection, Fast Fourier Transform, Spektrum magnitude ABSTRACT The use of technology and internet has grown rapidly that causes a lot of forgery and illegal proliferation of digital data. …”
    Get full text
    Article
  10. 1050

    ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing by Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Selvakumar Manickam, Zeyad Ghaleb Al-Mekhlafi, Abdulaziz M. Alayba, Amer A. Sallam

    Published 2023-03-01
    “…This research also satisfies privacy and security criteria, such as conditional privacy preservation, unlinkability, traceability, revocability, and resistance to security threats, as well as others (e.g., modify attacks, forgery attacks, replay attacks, and man-in-the-middle attacks). …”
    Get full text
    Article
  11. 1051

    Plasmonic nanopillar arrays encoded with multiplex molecular information for anti-counterfeiting applications by Liu, Yejing, Lee, Yih Hong, Zhang, Qi, Cui, Yan, Ling, Xing Yi

    Published 2020
    “…This feature combined with the high ∼17 000 pillars per inch (ppi) information density of the platform make its use extremely effective against counterfeiting and forgery. In summary, our encoding platform enables high security, large information density and low-error decoding.…”
    Get full text
    Journal Article
  12. 1052

    LPPA : lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks by Cao, Jin, Ma, Maode, Li, Hui

    Published 2021
    “…In addition, our proposed scheme can withstand a lot of protocol attacks including interior forgery attacks and DoS attacks and achieve identity privacy protection and group member update without sacrificing the efficiency. …”
    Get full text
    Journal Article
  13. 1053

    Detection & prevention of vulnerabilities in web applications by Wang, Jing

    Published 2016
    “…They belong to various categories, SQL Injection, Denial of Service (DoS), Cross-site Request Forgery (CSRF), Remote File Inclusion (RFI), Information Leakage, HTTP Response Splitting (CRLF), Code Injection and Directory Traversal. …”
    Get full text
    Thesis
  14. 1054
  15. 1055

    REDUCING THE RISKS OF ILLICIT TRAFFICKING IN INDUSTRIAL PRODUCTS TO ACHIEVE SUSTAINABLE DEVELOPMENT GOALS by A. L. Lisovsky

    Published 2022-08-01
    “…In this regard, it is necessary to analyze the risks of existing mechanisms of protection against counterfeit products and develop measures to reduce them.The object of research in this article is labeling, which is the application of a special DataMatrix code to the packaging and the entry of this unit of goods into the database.The purpose of the article is to develop recommendations on the use of additional visual control tools on the material carriers of the DataMatrix code, protected from forgery, and to assess the probability of the level of risk reduction and the level of possible losses when using them.The novelty of this study was: identification and analysis of risks of possible threats to the security of the mandatory labeling system for various categories of goods; development of a risk register of possible threats to the security of the system with a grouping of qualitatively assessed and quantifiable risks; development and verification of a model for assessing the probability and possible losses for a group of quantifiable risks; assessment of the probability of risks and possible budget losses from non-payment of taxes and excise duties; assessment of the probability of risks and possible losses for a bona fide manufacturer and end user; formation of management measures aimed at reducing the likelihood of risks and reducing the consequences of the potential implementation of risks; assessment of the residual level of probability and exposure to risks when using additional means of visual control on the material carriers of the DataMatrix code; assessment of the residual level of probability and exposure to risks when using additional visual inspection tools on tangible media protected from counterfeiting in similar systems and Track&Trace marking systems implemented in foreign countries.The results obtained can be applied by federal executive authorities in the formation of state policy in the field of increasing the level of security of Russians, significantly reduce the amount of counterfeit and low-quality analogues, effectively combat smuggling, protect legal businesses and consumers, and also allow the state to increase tax collection.…”
    Get full text
    Article
  16. 1056

    Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption by Jung Hee Cheon, Kyoohyung Han, Seong-Min Hong, Hyoun Jin Kim, Junsoo Kim, Suseong Kim, Hosung Seo, Hyungbo Shim, Yongsoo Song

    Published 2018-01-01
    “…The proposed LinHAE guarantees the security against eavesdropping and forgery attacks, unlike homomorphic encryption alone that does not provide means to check whether the received signal at the drone side is authentic or compromised. …”
    Get full text
    Article
  17. 1057

    A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF by Yeongjae Cho, Jihyeon Oh, Deokkyu Kwon, Seunghwan Son, Joonyoung Lee, Youngho Park

    Published 2022-01-01
    “…However, we prove that their scheme suffers from forgery, ephemeral secret leakage, and session key disclosure attacks. …”
    Get full text
    Article
  18. 1058
  19. 1059

    ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints by Mingfu Xue, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang, Jian Wang, Weiqiang Liu

    Published 2023-07-01
    “…Furthermore, it is demonstrated that ActiveGuard is robust against model fine‐tuning attack, pruning attack, and three types of fingerprint forgery attacks.…”
    Get full text
    Article
  20. 1060

    Vascular Auscultation of Carotid Artery: Towards Biometric Identification and Verification of Individuals by Rutuja Salvi, Patricio Fuentealba, Jasmin Henze, Pinar Bisgin, Thomas Sühn, Moritz Spiller, Anja Burmann, Axel Boese, Alfredo Illanes, Michael Friebe

    Published 2021-10-01
    “…However, they are vulnerable to tampering and forgery. Methods: The proposed approach uses blood flow sounds in the carotid artery as a source of biometric information. …”
    Get full text
    Article