نتایج جستجو برای: authenticity protection
تعداد نتایج: 186339 فیلتر نتایج به سال:
In Being and Time Heidegger believes that Dasein is the only being who has existence, he also argues Dasein has two existential modes: authenticity and in-authenticity. inauthenticity is usual Dasein’s existence, A way of Being in which Dasein has strayed away of himself and has fallen into the chaos of others. In this way of Being he deals to beings as others do, just in terms of efficiency an...
Optically variable pigment technologies for markings and inks have increased in use as overt protection methods for document and product security. These technologies use optical reflective effects including interference technologies that create angular dependent color changes. Novel developments in different inorganic and organic pigments offer potentially new optical performance for both overt...
It is foreseen that vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication systems will be deployed in the next decade. Data security is an enabler for V2V and V2I communication, because the authenticity, integrity and confidentiality of exchanged network traffic must be guaranteed, especially since these messages will certainly be used for safety applications. Furthermore, ...
Guarantee of authenticity, integrity and datedness is necessary to rely on digital data objects. In literature, there are several solutions which offer these guarantees in the long term, but not much is known about their performance. This work presents implementations for two promising solutions, namely Content Integrity System and Notarisation, and compares them in regard to their computationa...
We can distinguish three basic properties of information security, which should be implemented in nearly all IT systems: confidentiality, integrity and availability. Confidentiality means to protect the information against unauthorized access. Integrity is mentioned as a warranty of authenticity of information; it is also connected with protection against unauthorized interference. Availability...
The advent of Voice over IP (VoIP) has offered numerous advantages but, at the same time, it has introduced security threats not previously encountered in networks with a closed architecture like the Public Switch Telephone Networks (PSTN). One of these threats is that of signaling attacks. This paper examines the signaling attacks in VoIP environments based on the Session Initiation Protocol (...
A large variety of methods for using block ciphers, so called ‘modes of operation’, have been proposed, including some designed to provide both confidentiality and integrity protection. Such modes, usually known as ‘authenticated encryption’ modes, are increasingly important given the variety of issues now known with the use of unauthenticated encryption. In this paper we show that a mode known...
Image, which covers the highest percentage of the multimedia data, its protection is very important. This can be achieved by cryptography. Image encryption plays an important role to ensure confidential transmission and storage of image over internet.It becomes an important issue that how to protect the confidentiality, integrity, and authenticity of image.A real–time image encryption faces a g...
Honey authenticity is defined by the Codex Alimentarius standard, the EU Honey Directive and several national legislations. The Codex and EU standards were recently revised. The authenticity of honey and other bee products have two aspects. Authenticity in respect of production i.e. to prevent adulteration by addition of other food ingredients by correct beekeeping practice and processing. The ...
This paper will present a series of predominantly clinical observations concerning the lengthy work a patient carries out, with the help of the analyst, in order to achieve greater personal authenticity. When this work is drawing to a close and the patient has gained a degree of authenticity, this authenticity remains within him, almost without his realizing it. The power of authenticity is ins...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید