نتایج جستجو برای: tampering

تعداد نتایج: 1480  

2013
Ross Pinsky

Consider the random hypercube H 2 (pn) obtained from the hypercube H n 2 by deleting any given edge with probabilty 1− pn, independently of all the other edges. A diameter path in H 2 is a longest geodesic path in H n 2 . Consider the following two ways of tampering with the random graph H 2 (pn): (i) choose a diameter path at random and adjoin all of its edges to H 2 (pn); (ii) choose a diamet...

2018
James Wagner Alexander Rasin Tanu Malik Karen Heart Jacob D. Furst Jonathan Grier

Database Management Systems (DBMSes) secure data against regular users through defensive mechanisms such as access control, and against privileged users with detection mechanisms such as audit logging. Interestingly, these security mechanisms are built into the DBMS and are thus only useful for monitoring or stopping operations that are executed through the DBMS API. Any access that involves di...

1997
Ingemar J. Cox Jean-Paul M.G. Linnartz

Public watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as "never copy". In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to...

Journal: :Cell 2007
Luke A.J. O'Neill

Toll-like receptors (TLRs) provoke a profound inflammatory response during host defense and must be controlled in order to avoid autoimmune and inflammatory diseases. In this issue, Rothlin et al. (2007) uncover a complex negative feedback mechanism to limit TLR signaling involving the Tyro3/Axl/Mer (TAM) family of receptor tyrosine kinases, which induce expression of the inhibitory proteins SO...

2009
Jessie Yu-Feng Hsu Jessie Hsu Yu-Feng Hsu

Image Tampering Detection For Forensics Applications Jessie Yu-Feng Hsu The rapid growth of image editing softwares has given rise to large amounts of doctored images circulating in our daily lives, generating a great demand for automatic forgery detection algorithms in order to determine the authenticity of a candidate image in a timely fashion. A good forgery detection algorithm should be pas...

2017
Saeed Mahloujifar Mohammad Mahmoody

Austrin, Chung, Mahmoody, Pass and Seth [1] studied the notion of bitwise p-tampering attacks over randomized algorithms in which an efficient ‘virus’ gets to control each bit of the randomness with independent probability p in an online way. The work of [1] showed how to break certain ‘privacy primitives’ (e.g., encryption, commitments, etc.) through bitwise p-tampering, by giving a bitwise pt...

Journal: :SHS web of conferences 2023

The development of cloud computing and distributed technologies has shifted log management operations to an aggregated form. Diverse information devices as well systems perform data collection status analysis through a unified aggregation system. However, with the increasingly diverse business forms, threats confronted by are also mounting, among which leakage, tampering, loss, security vulnera...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید