Showing 1 - 15 results of 15 for search 'Witness tampering', query time: 0.09s Refine Results
  1. 1

    MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus by Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, Adeel Anjum

    Published 2021-07-01
    “…However, a user’s full control over a smart device can allow tampering of the location proof. Witness-oriented location proof systems (LPS) have emerged to resist the generation of false proofs and mitigate collusion attacks. …”
    Get full text
    Article
  2. 2

    Censorship, Control and Resistance in Eugene O’Neill’s “black plays” The Emperor Jones and All God’s Chillun Got Wings by Gwenola Le Bastard

    “…But these two controversial plays (each of which featured a black actor in the leading role) also highlighted the difficulty of tampering with the “color line”. These two “black plays” raise the issues of censorship and resistance both at the level of their writing and in connection with their production and reception. …”
    Get full text
    Article
  3. 3

    DroidEnemy: Battling adversarial example attacks for Android malware detection by Neha Bala, Aemun Ahmar, Wenjia Li, Fernanda Tovar, Arpit Battu, Prachi Bambarkar

    Published 2022-12-01
    “…In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. …”
    Get full text
    Article
  4. 4

    Blockchain-Based Secure Traceable Scheme for Food Supply Chain by S. Thangamayan, Kalyani Pradhan, Ganesh Babu Loganathan, S. Sitender, S. Sivamani, Mulugeta Tesema

    Published 2023-01-01
    “…The safety and dependability of food may be ensured by using the food traceability system to track food information. We can witness a series of detailed insights into food from the manufacturing source to the consumption terminal. …”
    Get full text
    Article
  5. 5

    Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes by Shaukat, Haafizah Rameeza

    Published 2014
    “…They commonly operate in hostile environments such as battle fields and surveillance zones, and due to their operating nature, MWSNs are often unattended, and generally are not equipped with tamper-resistant tools. With little effort, an adversary may capture the nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. …”
    Get full text
    Thesis
  6. 6

    Extended summary of ``A mathematical Phenomenon in the Quran of Earth-Shattering Proportions: A Quranic Theory Based on Gematria Determining Quran Primary Statistics (words, verses... by Mohsen Khaleghi Moghadam

    Published 2023-08-01
    “…Indeed, this study has discovered a mathematical framework in the Quran based on gematria (Abjad numerals) that provides substantial evidence of Quran’s divine authorship and its perfect protection from human tampering. Essentially, this study has proposed a new research direction in numerological studies of the Quran. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Recent Advances of Blockchain and Its Applications by Xiao Li, Weili Wu

    Published 2022-12-01
    “…Recent years have witnessed notable developments of blockchain technology itself as well as blockchain-enabled applications. …”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    SMS: A Secure Healthcare Model for Smart Cities by Gautami Tripathi, Mohd Abdul Ahad, Sara Paiva

    Published 2020-07-01
    “…The healthcare domain is already witnessing promising IoT-based solutions ranging from embedded mobile applications to wearable devices and implantable gadgets. …”
    Get full text
    Article
  14. 14
  15. 15