نتایج جستجو برای: authenticity protection
تعداد نتایج: 186339 فیلتر نتایج به سال:
A common approach to overcome the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. In order to secure data aggregation, in this paper we propose three schemes that rely on multipath routing. The first one guarantees dat...
Recently, works are completely based on the internet, so authentication is required to protect the content of the data because owner never wants to degrade the quality of his data. Information hiding via digital watermarks for the multimedia data is the compatible way to provide the protection of data. Watermarks are imperceptible and it is predefined pattern inserting into multimedia data to p...
This thesis presents a concept to achieve non-repudiation for natural language conversations by electronically signing continuous, packet-based, digital voice communication (VoIP). Signing a VoIP-based conversation means to protect the integrity and authenticity of the bidirectional data stream and its temporal sequence which together establish the security context of the communication. The sol...
In this paper we present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in two different based, i.e. RSA and elliptic curve cryptography both are modular based arithm...
This report describes the design and the implementation of a password protection system that has been proposed as an idea then developed by the author for his undergraduate final year project, at the University of Essex. When designing the system the author has concentrated on adding extra layers of security to the traditional security systems without having to completely replace the existing s...
The rapid growth of the world wide web and the wide spread usage of multimedia in the internet has resulted in various security and authenticity issues. Everyday multimedia content is shared via internet to different locations and different people across the globe. The various image processing techniques available today allows intellectual property theft and reproduction of digital images in an...
In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used to provide most of the new-generation network infrastructure-level services in the Internet. Unfortunately, the MPLS control plane lacks scalable verification for the authenticity and legitimacy of signaling messages and...
Consumer disposition to the information quality of the website, trust, privacy concerns, reputation, security concerns, and the company’s reputation have strong effects on Internet consumers’ trust in the website. Major two critical problems for both e-commerce consumers and sites are privacy and security. Privacy is the control over one’s personal data whereas; security is the attempted access...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید