نتایج جستجو برای: tamper

تعداد نتایج: 2422  

2015
Yu Bi

With the globalization of integrated circuit (IC) design flow and the outsourcing of chip fabrication service, intellectual property (IP) piracy and malicious logic insertion become main security threats to tamper hardware infrastructures. While most of the protection methods are dedicated for digital circuits, we try to protect radio-frequency (RF) designs which are more likely to be IP piracy...

1999
DEEPA KUNDUR DIMITRIOS HATZINAKOS

In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specifically address the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our problem include authentication for courtroom evidence, insurance claims, and journalistic photography. We present a novel fragile watermarking approach which embeds...

2014
Dana Dachman-Soled Yael Tauman Kalai

In this work we present an efficient compiler that converts any circuitC into one that is resilient to tampering with 1/ poly(k) fraction of the wires, where k is a security parameter independent of the size of the original circuit |C|. Our tampering model is similar to the one proposed by Ishai et al. (Eurocrypt, 2006) where a tampering adversary may tamper with any wire in the circuit (as lon...

Journal: :IJDCF 2016
Nana Wang

For 2D vector maps, obtaining high tamper localization accuracy without requiring extra space is a technically challenging problem. Using an adaptive group division approach and an improved reversible data hiding approach, the author proposes a reversible fragile watermarking method for locating tampered Polylines/Polygons in 2D vector maps. In particular, the author adaptively divide the featu...

Journal: :IACR Cryptology ePrint Archive 2012
Ding Wang Chunguang Ma Peng Wu

It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec’11, Li et al. showed that Kim and Chung’s passwordbased remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an...

2007
Reouven Elbaz David Champagne Ruby B. Lee Lionel Torres Gilles Sassatelli Pierre Guillemin

Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay require a large amount of on-chip memory to provide tamper-proof storage for metadata such as hash values or nonces. Tree-based strategies can be deployed to reduce this unacceptable overhead; for example, the well-kno...

Journal: :International Journal of Security and Its Applications 2013

Journal: :International Journal of Digital Crime and Forensics 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید