نتایج جستجو برای: tamper
تعداد نتایج: 2422 فیلتر نتایج به سال:
Efficient Tamper-Evident Data Structures for Untrusted Servers
The document D08 is the intermediate report from SHAMAN WP4. The document derives the requirements for a security module (SM) from the SHAMAN scenarios describing secure heterogeneous network access, personal area networks and personal CAs. It contains a reference model which can be used as a basis for the implementation of a SM. Finally the reference model is compared with current implementati...
BACKGROUND In an effort to address the continuing problem of prescription opioid abuse, manufacturers are incorporating new technologies into formulations that are designed to deter product tampering and misuse. Standards for laboratory assessment of tamper deterrent properties of new formulations have not previously been developed. METHODS Experimental designs were developed for the in vitro...
Utilities are currently installing a number of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data Acquisition) networks as part of their smart grid rollout. These devices present a security risk for utilities: They are deployed in many different places and environments; they have very little physical security; and they have direct access b...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...
Raw network traces can be used to compromise the privacy of Internet users. For this reason, many ISPs are reluctant to collect network traces – they often regard possession of such traces as a liability. To mitigate this concern, anonymization techniques have been developed to protect user-identifying information. While most projects anonymize their traces as a post-processing step (i.e., offl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید