نتایج جستجو برای: sensitive synthetic schemes side

تعداد نتایج: 715793  

2011
V. Ganesh Babu Senthil Kumar

The present strategies that reduce the delay associated with multicast authentication, make more efficient usage of receiver-side buffers, make delayed key disclosure authentication more resilient to buffer overflow denial of service attacks, and allow for multiple levels of trust in authentication. Throughout this base paper, the main focus of discussion will be on the popular multicast authen...

2008
Huajian Liu

ii tampering detection is enabled in the authentication process by presetting the noise filter size. Second, we study the unique characteristics of synthetic images and develop a novel watermarking scheme for synthetic image authentication. The proposed watermarking algorithm is fully compatible with the characteristics of synthetic images. With less pixels modified, the authentication system c...

Journal: :Computer Networks 2014
Ankunda R. Kiremire Matthias R. Brust Vir V. Phoha

Multiple schemes that utilize Probabilistic Packet Marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing their attack graphs and identifying the attack sources. By analyzing a set of PPM-based schemes, we show that past researchers have evaluated the schemes using disparate and often inadequate underlying topologies, which makes a side-by-s...

This paper contains a strain gradient theory to capture size effects in rotating nanodisks of variable thickness under thermal and mechanical loading. Material properties of nanodisks have been taken homogeneous material. The strain gradient theory and the Hamilton’s principle are employed to derive the governing equations. Due to complexity of the governing differential equation and boundary c...

Journal: :IEEE Transactions on Parallel and Distributed Systems 2022

The cloud computing paradigm provides numerous tempting advantages, enabling users to store and share their data conveniently. However, are naturally resistant directly outsourcing the since often contain sensitive information. Although several fine-grained access control schemes for cloud-data sharing have been proposed, most of them focus on encrypted (e.g., restricting decryption capabilitie...

2010
Wenjun Lu Avinash L. Varna Ashwin Swaminathan Min Wu

The advancement of information technology is rapidly integrating the physical world where we live and the online world where we retrieve and share information. One immediate example of such integration is the increasing popularity of storing and managing personal data using third-party web services, as part of the emerging trend of cloud computing. Secure management of sensitive data stored onl...

Journal: :The Journal of biological chemistry 1993
R Callaghan J R Riordan

The ability of P-glycoprotein (P-gp) to transport naturally occurring and synthetic opiate analgesics was investigated. Multidrug-resistant Chinese hamster ovary cells (B30) were found to accumulate significantly lower amounts of morphine than their drug-sensitive counterparts (B1). This decreased accumulation was reversed upon depletion of cellular stores of ATP. In addition, morphine bound to...

ژورنال: پژوهش های فلسفی 2017

The paper addresses the main questions to be dealt with by any semantic theory which is committed to provide an explanation of how meaning is possible. On one side the paper argues that the resources provided by the development of mathematical logic, theoretical computer science, cognitive psychology, and general linguistics in the 20th Century, however indispensable to investigate the structur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید