On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication
نویسندگان
چکیده
In our modern clock-ruled culture, it is not too much to say that no society can exist unless based on “time”. Computers, which are the key device of an information society, are equipped with high precision clocks to synchronize their entire circuit function. In an electronic environment or digital society built on computers, recordkeeping relates inevitably to the time that is ticked away by the clocks embedded in the computers. Time is thus the infrastructure of this information society. The scope of discussion here focuses on some specific industries and applications for time-stamping technologies. We focused mainly on time-authentication (timestamp). This study will be further refined step by step as their validity is verified in actual use. On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication
منابع مشابه
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملCurrent Discussions on Digital Sketching in the Early Stages of Architectural Design in Education
In the architectural design, designers are focused on the early stages of the design process or conceptual design. The ultimate goal of this stage is to find a solution for an existing problem, investigate design space, or explore an idea. This stage conventionally begins with sketches and diagrams to explore ideas and solutions; the ambiguity and vagueness of conventional freehand sketching ca...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJCWT
دوره 3 شماره
صفحات -
تاریخ انتشار 2013