نتایج جستجو برای: authenticity protection

تعداد نتایج: 186339  

Journal: :JSW 2014
Genqiang Wu Yeping He Yi Lu Liping Ding

Location-based applications require a user’s location data to provide customized services. However, location data is a sensitive piece of information that should not be revealed unless strictly necessary which induces the emerging of a number of location privacy protection methods, such as anonymity and obfuscation. However, in many applications, one needs to verify the authenticity and other p...

2011
J Barry Dickinson

This paper examines the concept of authenticity as it applies to relationship marketing. The rationale for this paper is the belief that authenticity is a key variable to consider in the context of successful relationship marketing scholarly attention from business researchers scholars from other disciplines have engaged with authenticity are related to authenticity include trust, integrity and...

Journal: :Sustainability 2021

This year, 40 years have passed since the adoption of basic document for protection historic gardens, i.e., Florence Charter. During this time, its recommendations been verified by both conservation and researchers’ actions, who in various environments discussed meaning as well essential shortcomings. Some provisions Charter were criticized context effects their use, especially those relating t...

2014
Madelaine Abel Sally Theran

....................................................... 4 Introduction ........................................................ 5 Method ........................................................... 21 Results ........................................................... 27 Discussion ........................................................... 35 References ............................................

Journal: :Journal of Chemical Education 2007

2008
Erik-Oliver Blaß Joachim Wilke Martina Zitterbart

In-network data aggregation allows energy-efficient communication within a sensor network. However, such data aggregation introduces new security challenges. As sensor nodes are prone to node-compromise, a fraction of nodes might act maliciously and forge aggregated data. For arbitrary aggregation functions, the verification of authenticity of aggregated data, i.e., its correctness, integrity, ...

2010
Denis Dutton

Works of art possess what we may call nominal authenticity, defined simply as the correct identification of the origins, authorship, or provenance of an object, ensuring that an object of aesthetic experience is properly named. However, the concept of authenticity often connotes something else, having to do with an object’s character as a true expression of an individual’s or a society’s values...

2013
Vishal Verma Jyotsna Singh

Digital watermarking plays an increasingly important role for proving authenticity and copyright protection. The Internet is an ideal medium for selling digital goods it also makes redistribution of pirated files very easy. Digital watermarking can be used to insert invisible data into an object helping to track down pirate copies and to prove rightful ownership in a dispute. In this paper we p...

2007
Lars Völker Marcus Schöller

SSL/TLS has been designed to protect authenticity, integrity, and confidentiality. However, considering the possibility of TCP data injection, as described in [Wa04], it becomes obvious that this protocol is vulnerable to DoS attacks just because it is layered upon TCP. In this paper, we analyze DoS-attacks on SSL/TLS and describe a simple, yet effective way to provide protection for SSL/TLS by...

2002
Adrian Spalka Hanno Langweg

The protection qualities of discretionary access control systems realised by today's prevalent operating systems are based on an assessment of the trustworthiness of users. By starting a program a user transfers his trustworthiness to it, ie, there is the tacit assumption that the program's trustworthiness at least matches that of the user. However, malicious programs are a growing source of th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید