نتایج جستجو برای: authenticity

تعداد نتایج: 6831  

Journal: :Neural networks : the official journal of the International Neural Network Society 2003
Harold Szu Steven Noel Seong-Bin Yim Jefferson M. Willey Joe Landa

We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a c...

2000
M. J. Latorre

Authenticity is an important food quality criterion. Rapid methods for confirming authenticity and detecting adulteration are widely demanded by food producers, processors, consumers and regulatory bodies. The objective of this work was to develop a model that would confirm the authenticity of Galician-labelled honeys as Galician-produced honeys. Nine metals were determined in 42 honey samples ...

2001
Jee Hea An Mihir Bellare

A popular paradigm for achieving privacy plus authenticity is to append some “redundancy” to the data before encrypting. We investigate the security of this paradigm at both a general and a speci£c level. We consider various possible notions of privacy for the base encryption scheme, and for each such notion we provide a condition on the redundancy function that is necessary and suf£cient to en...

2011
Natalie Stoljar NATALIE STOLJAR

Andrea Westlund’s ‘Rethinking Relational Autonomy’ and Catriona Mackenzie and Jacqui Poltera’s ‘Narrative Integration, Fragmented Selves and Autonomy’ have many overlapping themes. In what follows, I draw out one of the overlapping themes: both articles distinguish between the necessary conditions for ‘identity’ or cross-temporal agency and the necessary conditions for autonomy. I suggest that ...

2016
Tracey Lee

Discussions concerning transsexual identities consider the self representations of transsexuals as either determined through medical discourses and practices, and thus as constructed and inauthentic or, alternatively, as expressive of an interior and thus ‘authentic’ essential self. In contrast to each of these arguments, this paper highlights the significance of social interaction to transsexu...

2004
Javier R. Saeta Javier Hernando Oscar Manso Manel Medina

The increasing popularity and importance of electronic commerce is evident today. However, global electronic commerce will not fully develop its immense potential unless trust is fully established. Digital certificates and electronic signature contribute to increase confidence and security by providing authenticity. However, authenticity on its own is not enough to provide trust. A credible ser...

2009
Thanassis Tiropanis Tassos Dimitriou

As the amount of information resources on the Web keeps increasing so are the concerns for information integrity, confidentiality and authenticity. In Web 2.0 users are producers as well as consumers of content and metadata, which makes guaranteeing the authenticity and integrity of information critical. The scale of the Web requires that any proposals in this direction require minimal (if any)...

2015
E. Schievano

Control of honey frauds is needed in Ecuador to protect bee keepers and consumers because simple syrups and new syrups with eucalyptus are sold as genuine honeys. Authenticity of Ecuadorian commercial honeys was tested with a vortex emulsion consisting on one volume of honey:water (1:1) dilution, and two volumes of diethyl ether. This method allows a separation of phases in one minute to discri...

2014
Shwe Baw

In order to help our students learn English more effectively, we teachers of English need to place an equal emphasis both on designing suitable teaching materials and making use of effective teaching methodologies. Of the two types of teaching materials; namely authentic and non-authentic materials that are being used nowadays in schools and universities in most EFL countries, the use of the fo...

2006
Dusko Pavlovic Catherine A. Meadows

Secrecy and authenticity properties of protocols are mutually dependent: every authentication is based on some secrets, and every secret must be authenticated. This interdependency is a significant source of complexity in reasoning about security. We describe a method to simplify it, by encapsulating the authenticity assumptions needed in the proofs of secrecy. This complements the method for e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید