نتایج جستجو برای: tamper

تعداد نتایج: 2422  

Journal: :Journal of Artificial Intelligence 2017

Journal: :Electronic Proceedings in Theoretical Computer Science 2012

2009
Scott Alexander Crosby Farinaz Koushanfar

Efficient Tamper-Evident Data Structures for Untrusted Servers

2002
Hans-Jürgen Heinrich Hans-Jürgen Giesecke

The document D08 is the intermediate report from SHAMAN WP4. The document derives the requirements for a security module (SM) from the SHAMAN scenarios describing secure heterogeneous network access, personal area networks and personal CAs. It contains a reference model which can be used as a basis for the implementation of a SM. Finally the reference model is compared with current implementati...

Journal: :Drug and alcohol dependence 2013
Edward J Cone Jennifer Giordano Brianne Weingarten

BACKGROUND In an effort to address the continuing problem of prescription opioid abuse, manufacturers are incorporating new technologies into formulations that are designed to deter product tampering and misuse. Standards for laboratory assessment of tamper deterrent properties of new formulations have not previously been developed. METHODS Experimental designs were developed for the in vitro...

2014
Jason Reeves Sean Smith

Utilities are currently installing a number of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data Acquisition) networks as part of their smart grid rollout. These devices present a security risk for utilities: They are deployed in many different places and environments; they have very little physical security; and they have direct access b...

Journal: :IEICE Transactions 2007
Nozomi Ishihara Kôki Abe

This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...

2007
Andrew G. Miklas Stefan Saroiu Alec Wolman Angela Demke Brown

Raw network traces can be used to compromise the privacy of Internet users. For this reason, many ISPs are reluctant to collect network traces – they often regard possession of such traces as a liability. To mitigate this concern, anonymization techniques have been developed to protect user-identifying information. While most projects anonymize their traces as a post-processing step (i.e., offl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید