نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

Journal: :Communications in computer and information science 2022

Abstract Since its introduction in Bitcoin, the blockchain has proven to be a versatile data structure. In role as an immutable ledger, it grown beyond initial use financial transactions used recording wide variety of other useful information. this paper, we explore application outside traditional decentralized, domain. We show how, even with only single “mining” node, proof-of-work can corners...

2013
Chan-Il Woo Seung-Dae Lee

Fragile watermarking has the characteristics where the inserted watermark should be easily breakable for a trivial tampering of the image. So, fragile watermarking technique is proposed for the purpose of authentication or tamper detection. In this paper, we propose an efficient image tamper detection method using block-wise technique which is able to detect the tamper locations. In the propose...

2000
Masayuki Terada Hiroshi Kuno Masayuki Hanadate

This paper proposes FlexToken, a new copy prevention scheme for digital rights such as tickets or coupons, which are circulated as pieces of paper in the real world. The important feature of this scheme is that digital rights are represented using two separate types of information: the contents and the token of the rights. The token represents the \genuineness" of the contents and distinguishes...

Journal: :J. Information Security 2012
Shweta Tripathi Bandu Baburao Meshram

Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing w...

Journal: :Journal of Artificial Intelligence 2017

Journal: :Electronic Proceedings in Theoretical Computer Science 2012

2009
Scott Alexander Crosby Farinaz Koushanfar

Efficient Tamper-Evident Data Structures for Untrusted Servers

2002
Hans-Jürgen Heinrich Hans-Jürgen Giesecke

The document D08 is the intermediate report from SHAMAN WP4. The document derives the requirements for a security module (SM) from the SHAMAN scenarios describing secure heterogeneous network access, personal area networks and personal CAs. It contains a reference model which can be used as a basis for the implementation of a SM. Finally the reference model is compared with current implementati...

Journal: :Drug and alcohol dependence 2013
Edward J Cone Jennifer Giordano Brianne Weingarten

BACKGROUND In an effort to address the continuing problem of prescription opioid abuse, manufacturers are incorporating new technologies into formulations that are designed to deter product tampering and misuse. Standards for laboratory assessment of tamper deterrent properties of new formulations have not previously been developed. METHODS Experimental designs were developed for the in vitro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید