نتایج جستجو برای: tampering

تعداد نتایج: 1480  

2017
Sebastian Faust Kristina Hostáková Pratyay Mukherjee Daniele Venturi

Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010— are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t. some class of tampering adversaries, result in a decoded value that is either identical or unrelated to the original message. Such codes are very useful for protecting arbitrary cryptographic primitives against tampering a...

Journal: :International Journal of Computer Applications 2017

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2019

Journal: :Electronics 2022

The purpose of this study is to overcome coordination flaws and enhance end-to-end security in the drug distribution market (DDM). One major issues management absence a centralized monitoring system provide adequate control offer real-time prices, availability, authentication data. Further, tampering another serious issue affecting DDM, as consequence, there significant global for counterfeit d...

2013
E. Agnes S. Devi Mahalakshmi Dr. K. Vijayalakshmi

1, 2 Department of Computer Science and Engineering 3 Department of Information Technology Mepco Schlenk Engineering College, Sivakasi Affiliated to Anna University, Chennai, India Abstract—An Extensive growth in software technologies available on Internet results in tampering of images. The main problem in the real world is to determine whether an image is real or forged. In this paper we prop...

Journal: :IEEE Access 2023

In order to improve the extraction effect of features tampered region, model usually relies on a specific feature defined by hand optimize model. However, is not ideal when mode unknown. this paper, Neck layer YOLOv5s reasonably embedded into CBAM attention module, so that can more accurately capture region. addition, boundary frame loss optimized using EIOU function, which separately dissolves...

2014
Divesh Aggarwal Yevgeniy Dodis Tomasz Kazana Maciej Obremski

Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs [DPW10], provide a useful message integrity guarantee in situations where traditional error-correction (and even error-detection) is impossible; for example, when the attacker can completely overwrite the encoded message. Informally, a code is non-malleable if the message contained in a modified codeword is either the original m...

2018
Joydeep Rakshit Kartik Mohanram

Data tampering attacks threaten data integrity in emerging nonvolatile memories (NVMs). Whereas Merkle Tree (MT) memory authentication is e ective in thwarting data tampering attacks, it drastically increases cell writes and memory accesses, adversely impacting NVM energy, lifetime, and system performance. We propose ASSURE, a low overhead, high performance Authentication Scheme for SecURE ener...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید