نتایج جستجو برای: authenticity protection

تعداد نتایج: 186339  

2002
Cédric Fournet Martín Abadi

We present the analysis of a protocol for private authentication in the applied pi calculus. We treat authenticity and secrecy properties of the protocol. Although such properties are fairly standard, their formulation in the applied pi calculus makes an original use of process equivalences. In addition, we treat identity-protection properties, which are a delicate concern in several recent pro...

Journal: :Strumenti per la didattica e la ricerca 2021

The contribution discusses oral sources, their use for historical and social research, authenticity reliability, considering the relevant perspective of legal protection.

2011
Prasanna Venkatesan

Nowadays, money is one of the familiar talks worldwide, and also money is inseparable among the people in tradition. But money suffers from lack of security through money laundering, counterfeits, privacy protection and speediness in currency counts. Thus, to have these securities in money an application of RFID is a banknote attached a tag to determine the authenticity of money and to stop cou...

Journal: :I. J. Network Security 2017
Guifa Hou Zhijie Wang

Along with the extensive prevalence of the network and the portable equipments, people can access network resources conveniently. The protection of participants’ privacy and data confidentiality is significant. Authentication mechanism is essential to assure the authenticity of all participants and forbid the illegal accessing. In this paper, we propose a robust remote authentication scheme wit...

2001
Thierry Pun

Three major aspects in the protection of digital documents have been pointed out, each of them with di erent requirements: rst copyright protection, protecting ownership and usage rights; secondly tamper-proo ng, aiming at checking document integrity; and thirdly authentication, the purpose of which is to check the authenticity of a document. While robust watermarks are typically used for copyr...

Journal: :Informatica, Lith. Acad. Sci. 2012
Romualdas Bausys Arturas Kriukovas

In this paper robust image authentication integrated with semi-fragile pixel-wise tamper localization is analyzed. A new pixel-wise transformation robust to blurring/sharpening while fragile to all other image processing operations is proposed. A new method featuring binary and percentage measures with novel ability to integrate human opinion for image authenticity evaluation is presented. Prot...

2006
G. Coatrieux L. Lecornu B. Sankur

In this article, we focus on the complementary role of watermarking with respect to medical information security (integrity, authenticity ...) and management. We review sample cases where watermarking has been deployed. We conclude that watermarking has found a niche role in healthcare systems, as an instrument for protection of medical information, for secure sharing and handling of medical im...

2012
Neha Gupta Mukesh Sharma

Abstractwith the advent of digital media copyright protection is main concern. To protect copyright of images DWT DCT image watermarking is used. In this CDMA approach of embedding watermark is taken so that maximum number of watermarks can be embedded in original image to increase its authenticity. After embedding PSNR values are calculated at each watermark embedding and a table is constructe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید