نتایج جستجو برای: tamper detection
تعداد نتایج: 567946 فیلتر نتایج به سال:
Cryptographic assumptions regarding tamper-proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even can be used to create so...
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for changes in the executable code as it is running and report modifications. The mechanism is built to be compatible with copy-specific static watermarking and other tamper-resistance techniques. The mechanism includes s...
For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper-proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been...
Code modification is the main method for software piracy. Making software tamper resistant is the challenge for software protection. In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism mak...
Fuzzy identity-based encryption (FIBE) has found many applications, such as biometric-based encryption, since its notion was firstly proposed by Sahai and Waters [15]. In this paper, we show how to minimize the damage of secret key exposure in FIBE. We introduce a new notion which we call fuzzy identity-based key-insulated encryption (FIBKIE). In FIB-KIE, the secret key associated with an ident...
An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-resistant interpreter for a programming language – currently Lisp 1.5 – combined with the use of a secure co-processor can address this problem. This solution executes the interpreter on the secure coprocessor while the code and data...
Abstract Since its introduction in Bitcoin, the blockchain has proven to be a versatile data structure. In role as an immutable ledger, it grown beyond initial use financial transactions used recording wide variety of other useful information. this paper, we explore application outside traditional decentralized, domain. We show how, even with only single “mining” node, proof-of-work can corners...
This paper presents an algorithm called CIPDEC (Content Integrity of Printed Documents using Error Correction), which identifies any modifications made to a printed document. CIPDEC uses an error correcting code for accurate detection of addition/deletion of even a few pixels. A unique advantage of CIPDEC is that it works blind – it does not require the original document for such detection. Ins...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید