نتایج جستجو برای: authenticity protection

تعداد نتایج: 186339  

Journal: :Journal of Computer Security 2003
Premkumar T. Devanbu Michael Gertz Charles U. Martel Stuart G. Stubblebine

Integrity critical databases, such as financial information used in high-value decisions, are frequently published over the Internet. Publishers of such data must satisfy the integrity, authenticity, and non-repudiation requirements of clients. Providing this protection over public data networks is an expensive proposition. This is, in part, due to the difficulty of building and running secure ...

2000
Premkumar T. Devanbu Michael Gertz Charles U. Martel Stuart G. Stubblebine

Integrity critical databases, such as financial information, which are used in high-value decisions, are frequently published over the internet. Publishers of such data must satisfy the integrity, authenticity, and non-repudiation requirements of end clients. Providing this protection over public data networks is an expensive proposition. This is, in part, due to the difficulty of building and ...

Journal: :IJDC 2009
Andrew Wilson

Long-term preservation of digital objects requires curators to be able to guarantee the archival authenticity of the objects in a digital repository. In IJDC 4(1), Ronald Jantz suggested that a digital certificate is sufficient to ensure authenticity. The letter writer takes issue with this view and points out some of the archival misinterpretations in the Jantz article. He maintains that the a...

Journal: : 2023

The article discusses approaches to determining the details of a document as an object forensic research. In relation modern requests for practice checking documents at checkpoints across State Border Republic Belarus, author's version definition proving identity citizen is formulated. For purposes subsequent more accurate authentication itself, existing grounds differentiating are analyzed. Ne...

Journal: :علوم قرآن و حدیث 0
علی اکبر ایزدی فرد محمد محسنی دهکلانی سید مجتبی حسین نژاد

tuhaf al-uqūl is the name of a hadīth collection, the author of which is abu muhammad ḥasan ibn alī ibn ḥussein ibn shu‘bat al-ḥarrānī. he is one of the hadīth narrators of the fourth century (a.h), and according to some sayings, he was one of sheikh mufīd’s preceptors. one of the features of tuhaf al-uqūl is its containing some single hadīths, which have no equivalent in other hadīth collectio...

Journal: :Pervasive and Mobile Computing 2015
Alsharif Abuadbba Ibrahim Khalil Mohammed Atiquzzaman

Cognitive Radio Networks have recently attracted attention because of high efficiency and throughput performance. They transmit (1) repetitively collected readings (e.g. monitoring) and (2) highly confidential data (e.g. geometric location). However, the privacy and the authenticity of the transmitted data are major challenges. This paper proposes a novel steganographic technique that guarantee...

Journal: :Philosophy, Psychiatry, & Psychology 2014

2007
Ronald de Sousa

Emotions are Janus-faced. They tell us something about the world, and they tell us something about ourselves. This suggests that we might speak of a truth, or perhaps two kinds of truths of emotions, one of which is about self and the other about conditions in the world. On some views, the latter comes by means of the former. Insofar as emotions manifest our inner life, however, we are more inc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید