On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication

نویسندگان

  • Masakazu Ohashi
  • Mayumi Hori
چکیده

In our modern clock-ruled culture, it is not too much to say that no society can exist unless based on “time”. Computers, which are the key device of an information society, are equipped with high precision clocks to synchronize their entire circuit function. In an electronic environment or digital society built on computers, recordkeeping relates inevitably to the time that is ticked away by the clocks embedded in the computers. Time is thus the infrastructure of this information society. The scope of discussion here focuses on some specific industries and applications for time-stamping technologies. We focused mainly on time-authentication (timestamp). This study will be further refined step by step as their validity is verified in actual use. On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Current Discussions on Digital Sketching in the Early Stages of Architectural Design in Education

In the architectural design, designers are focused on the early stages of the design process or conceptual design. The ultimate goal of this stage is to find a solution for an existing problem, investigate design space, or explore an idea. This stage conventionally begins with sketches and diagrams to explore ideas and solutions; the ambiguity and vagueness of conventional freehand sketching ca...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJCWT

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2013