نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010— are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t. some class of tampering adversaries, result in a decoded value that is either identical or unrelated to the original message. Such codes are very useful for protecting arbitrary cryptographic primitives against tampering a...
The purpose of this study is to overcome coordination flaws and enhance end-to-end security in the drug distribution market (DDM). One major issues management absence a centralized monitoring system provide adequate control offer real-time prices, availability, authentication data. Further, tampering another serious issue affecting DDM, as consequence, there significant global for counterfeit d...
1, 2 Department of Computer Science and Engineering 3 Department of Information Technology Mepco Schlenk Engineering College, Sivakasi Affiliated to Anna University, Chennai, India Abstract—An Extensive growth in software technologies available on Internet results in tampering of images. The main problem in the real world is to determine whether an image is real or forged. In this paper we prop...
In order to improve the extraction effect of features tampered region, model usually relies on a specific feature defined by hand optimize model. However, is not ideal when mode unknown. this paper, Neck layer YOLOv5s reasonably embedded into CBAM attention module, so that can more accurately capture region. addition, boundary frame loss optimized using EIOU function, which separately dissolves...
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs [DPW10], provide a useful message integrity guarantee in situations where traditional error-correction (and even error-detection) is impossible; for example, when the attacker can completely overwrite the encoded message. Informally, a code is non-malleable if the message contained in a modified codeword is either the original m...
Data tampering attacks threaten data integrity in emerging nonvolatile memories (NVMs). Whereas Merkle Tree (MT) memory authentication is e ective in thwarting data tampering attacks, it drastically increases cell writes and memory accesses, adversely impacting NVM energy, lifetime, and system performance. We propose ASSURE, a low overhead, high performance Authentication Scheme for SecURE ener...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید