نتایج جستجو برای: tamper
تعداد نتایج: 2422 فیلتر نتایج به سال:
This paper describes a two instruction-stream (twoprocess) model for tamper resistance. One process (Monitor process, M-Process) is designed explicitly to monitor the control flow of the main program process (P-Process). The compilation phase compiles the software into two co-processes: P-process and M-process. The monitor process contains the control flow consistency conditions for the P-proce...
It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In 2011, Li and Lee showed that both Hsiang-Shih’s password-based remote user authentication schemes are vulnerable to various attacks if the smart card is non-tamper resistant. Consequently,...
Digital image fragile watermarking is an information hiding technique which adds the watermark into the host image for authentication .while achieving the high integrity one should not compromise with quality distortion of images. numbers of watermarking schemes exist today for balancing between the tamper detection rate and quality of reconstructed images in propose scheme we aim at maintain h...
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
As important special engineering equipment, tamper is used to complete the work of construction and maintenance in the railway field. In the present market, tampers are mostly mechanically driven and exist technical limitations. A new electro-hydraulic exciter applied on new tamper is proposed. It is mainly composed of new spin valve and new micro-displacement oscillation cylinder. In the paper...
INTRODUCTION In recent years, attention has been given to the development of abuse-deterrent and tamper-resistant opioid formulations in light of concern over the growing misuse and abuse of opioids prescribed for the treatment of chronic pain. AREAS COVERED This critical review discusses abuse-deterrent and tamper-resistant formulations, which may help to overcome concerns of misuse in using...
Secure computation in the presence of tamper-proof hardware tokens is proven under the assumption that the holder of the token is only given black-box access to the functionality of the token. Starting with the work of Goldreich and Ostrovsky [GO96], a long series of works studied tamper-proof hardware for realizing two-party functionalities in a variety of settings. In this work we focus our a...
Universally composable protocols provide security even in highly complex environments like the Internet. Without setup assumptions, however, UC-secure realizations of cryptographic tasks are impossible. To achieve efficient protocols, practical setup assumptions are needed. Tamper-proof hardware tokens, e.g. smart cards and USB tokens, can be used for this purpose. Apart from the fact that they...
Gradually, copyright-protection protocols have attracted much attention in that they provide effective copyright protection mechanisms. Asymmetric copyright-protection protocols allow the buyer to know and possess the protected content yet the seller has no idea about it. Subsequently, if an illegal copy is found, the seller can identify the buyer by cooperating with a trusted third party. Most...
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and inspect pages containing code and data of a target system under study. To avoid being infected by malicious or compromised targets, state of the art system integrity monitors rely on virtualization technology to set up a tamper-proof execution environment. Consequently, the virtualization infrastru...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید