نتایج جستجو برای: sensitive synthetic schemes side
تعداد نتایج: 715793 فیلتر نتایج به سال:
The present strategies that reduce the delay associated with multicast authentication, make more efficient usage of receiver-side buffers, make delayed key disclosure authentication more resilient to buffer overflow denial of service attacks, and allow for multiple levels of trust in authentication. Throughout this base paper, the main focus of discussion will be on the popular multicast authen...
ii tampering detection is enabled in the authentication process by presetting the noise filter size. Second, we study the unique characteristics of synthetic images and develop a novel watermarking scheme for synthetic image authentication. The proposed watermarking algorithm is fully compatible with the characteristics of synthetic images. With less pixels modified, the authentication system c...
Multiple schemes that utilize Probabilistic Packet Marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing their attack graphs and identifying the attack sources. By analyzing a set of PPM-based schemes, we show that past researchers have evaluated the schemes using disparate and often inadequate underlying topologies, which makes a side-by-s...
This paper contains a strain gradient theory to capture size effects in rotating nanodisks of variable thickness under thermal and mechanical loading. Material properties of nanodisks have been taken homogeneous material. The strain gradient theory and the Hamilton’s principle are employed to derive the governing equations. Due to complexity of the governing differential equation and boundary c...
The cloud computing paradigm provides numerous tempting advantages, enabling users to store and share their data conveniently. However, are naturally resistant directly outsourcing the since often contain sensitive information. Although several fine-grained access control schemes for cloud-data sharing have been proposed, most of them focus on encrypted (e.g., restricting decryption capabilitie...
The advancement of information technology is rapidly integrating the physical world where we live and the online world where we retrieve and share information. One immediate example of such integration is the increasing popularity of storing and managing personal data using third-party web services, as part of the emerging trend of cloud computing. Secure management of sensitive data stored onl...
The ability of P-glycoprotein (P-gp) to transport naturally occurring and synthetic opiate analgesics was investigated. Multidrug-resistant Chinese hamster ovary cells (B30) were found to accumulate significantly lower amounts of morphine than their drug-sensitive counterparts (B1). This decreased accumulation was reversed upon depletion of cellular stores of ATP. In addition, morphine bound to...
The paper addresses the main questions to be dealt with by any semantic theory which is committed to provide an explanation of how meaning is possible. On one side the paper argues that the resources provided by the development of mathematical logic, theoretical computer science, cognitive psychology, and general linguistics in the 20th Century, however indispensable to investigate the structur...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید