نتایج جستجو برای: tamper

تعداد نتایج: 2422  

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2014

Journal: :TELKOMNIKA (Telecommunication Computing Electronics and Control) 2014

Journal: :IEEE Security & Privacy Magazine 2009

Journal: :International Journal of Hospitality Management 2022

Restaurant-to-consumer food delivery has experienced disruption with the growth of third-party services such as DoorDash and Uber Eats. However, this platform-to-consumer method introduces increased opportunities for tampering contamination due to additional touchpoints in process. To mitigate these concerns, more restaurants are implementing tamper-evident closures seals attached containers us...

2003
Dennis Heimbigner

An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-detecting interpreter for a programming language – specifically Lisp 1.5 – combined with the use of a secure co-processor can address this problem. The term “tamper-detecting” means that any attempt to corrupt a computation carried o...

1993
Yuliang Zheng

A key distribution protocol is a set of rules by which two users can establish a shared common key between them and then use the key in future secure communications. We analyze a key distribution protocol presented by Leighton and Micali at the CRYPTO'93 conference, which is based on tamper-proof hardware, and show that the protocol fails in that a common key shared between two users can always...

Journal: :Canadian Medical Association Journal 2015

Journal: :International Journal of Quantum Information 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید