نتایج جستجو برای: authenticity protection
تعداد نتایج: 186339 فیلتر نتایج به سال:
Location-based applications require a user’s location data to provide customized services. However, location data is a sensitive piece of information that should not be revealed unless strictly necessary which induces the emerging of a number of location privacy protection methods, such as anonymity and obfuscation. However, in many applications, one needs to verify the authenticity and other p...
This paper examines the concept of authenticity as it applies to relationship marketing. The rationale for this paper is the belief that authenticity is a key variable to consider in the context of successful relationship marketing scholarly attention from business researchers scholars from other disciplines have engaged with authenticity are related to authenticity include trust, integrity and...
This year, 40 years have passed since the adoption of basic document for protection historic gardens, i.e., Florence Charter. During this time, its recommendations been verified by both conservation and researchers’ actions, who in various environments discussed meaning as well essential shortcomings. Some provisions Charter were criticized context effects their use, especially those relating t...
....................................................... 4 Introduction ........................................................ 5 Method ........................................................... 21 Results ........................................................... 27 Discussion ........................................................... 35 References ............................................
In-network data aggregation allows energy-efficient communication within a sensor network. However, such data aggregation introduces new security challenges. As sensor nodes are prone to node-compromise, a fraction of nodes might act maliciously and forge aggregated data. For arbitrary aggregation functions, the verification of authenticity of aggregated data, i.e., its correctness, integrity, ...
Works of art possess what we may call nominal authenticity, defined simply as the correct identification of the origins, authorship, or provenance of an object, ensuring that an object of aesthetic experience is properly named. However, the concept of authenticity often connotes something else, having to do with an object’s character as a true expression of an individual’s or a society’s values...
Digital watermarking plays an increasingly important role for proving authenticity and copyright protection. The Internet is an ideal medium for selling digital goods it also makes redistribution of pirated files very easy. Digital watermarking can be used to insert invisible data into an object helping to track down pirate copies and to prove rightful ownership in a dispute. In this paper we p...
SSL/TLS has been designed to protect authenticity, integrity, and confidentiality. However, considering the possibility of TCP data injection, as described in [Wa04], it becomes obvious that this protocol is vulnerable to DoS attacks just because it is layered upon TCP. In this paper, we analyze DoS-attacks on SSL/TLS and describe a simple, yet effective way to provide protection for SSL/TLS by...
The protection qualities of discretionary access control systems realised by today's prevalent operating systems are based on an assessment of the trustworthiness of users. By starting a program a user transfers his trustworthiness to it, ie, there is the tacit assumption that the program's trustworthiness at least matches that of the user. However, malicious programs are a growing source of th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید