نتایج جستجو برای: authenticity

تعداد نتایج: 6831  

2005
Jacek Jonczy Rolf Haenni

In large open networks, handling trust and authenticity adequately is an important prerequisite for security. In a distributed approach, all network users are allowed to issue various types of credentials, e.g. certificates, recommendations, revocations, ratings, etc. This paper proposes such a distributed approach, in which the evaluation of trust and authenticity is based on so-called credent...

2014
Hossein HOSSEINI Shahram KHAZAEI Hossein Hosseini Shahram Khazaei

This paper presents the Code-Book Authentication mode (CBA), a submission to the CAESAR competition for authenticated encryption. CBA is a blockcipher mode of encryption that provides confidentiality and authenticity for plaintexts and authenticity for associated data. The proposed mode improves the OCB mode in the sense that it saves up to one blockcipher call to encrypt and authenticate the p...

2013
Klaus Stranacher Vesna Krnjic Thomas Zefferer

The public sector holds large amounts of data of various areas such as social affairs, economy, or tourism. Various initiatives such as Open Government Data or the EU Directive on public sector information aim to make these data available for public and private service providers. Requirements for the provision of public sector data are defined by legal and organizational frameworks. Surprisingl...

2017

This article proposes an approach to vocational skill development which emphasises the authenticity of learning experiences. Authenticity is defined in terms of a sociocultural construction of vocational knowledge. Using empirical data, current research and theorising, it is argued that learning arrangements situated in the workplace presents a viable option for the development of vocational sk...

Journal: :Information & Management 2013
Ofir Turel Catherine E. Connelly Glenda M. Fisk

Many companies work hard to ensure that service representatives are friendly when interacting with customers. Friendliness, however, is not always enough; customers must believe that service employees are not just acting out a friendly role. In our study, we extrapolated this idea to web-based support services. Integrating IS and marketing perspectives, we suggested that user judgment of human ...

2011
Gerhard de Koning Gans Eric R. Verheul

Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent value. Even though this class of codes is extensively used there are no general guidelines for the design of Activation Code schemes. We discuss d...

2015
Oliver C. Robinson Frederick G. Lopez Katherine Ramos

A sample of adults (N = 553) aged 18–56 completed self-report measures of recalled parental antipathy/ neglect in childhood, Big Five personality traits (rated across three contexts: with parents, friends and work colleagues), and authenticity. Parents, friends and work colleagues of those self-report participants (N = 895) completed other-report Big Five trait measures. Parental neglect and an...

2003
Harold Szu Steven Noel Seong-Bin Yim Jeff Willey Joe Landa

We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a c...

2005
Gerome Miklau Dan Suciu

The World Wide Web is a medium for publishing data used by collaborating groups and communities of shared interest. This paper proposes mechanisms to support the accuracy and authenticity of published data. In our framework, publishers annotate data with virtually unforgeable evidence of authorship. Intermediaries may query, restructure, and integrate this data while propagating the annotations...

2016
Anil Dada Warbhe Rajiv V. Dharaskar Vilas M. Thakare

It is very important to authenticate the digital image for its authenticity. The issue of the authenticity and integrity of digital images is progressively critical. Day by day, it's getting easier to create image forgeries because of the sophisticated image editing software programs. There are various types of digital image manipulation or tampering possible; like image compositing, splic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید