نتایج جستجو برای: composite fingerprinting
تعداد نتایج: 130702 فیلتر نتایج به سال:
Fingerprinting schemes deter people from illegal copying of digital data by enabling the merchant of the data to identify the original buyer of a copy that was redistributed illegally. All known fingerprinting schemes are symmetric in the following sense: Both the buyer and the merchant know the fingerprinted copy. Thus, when the merchant finds this copy somewhere, there is no proof that it was...
This paper addresses some of the discriminants that make IPSec tunnel fingerprinting possible. Fingerprinting of VPN-tunnel endpoints may be desirable for forensic purposes, but in the hands of individuals of ill-intent, it undermines an enterprise network’s perimeter security. Three ways of preventing the ill-use of this type of fingerprinting are presented. The first two, apply to enterprises...
The aim of this paper is to develop a rapid, and highly sensitive quantitative HPLC fingerprint method with multiple indicators by using the Compound Chinese Medicine Wuwei Changyanning granule and 5 herbs in the prescription. The quantitative fingerprint chromatogram with multiple indicators was investigated. ⅰ)6 compositions included rutin, gallic acid, chlorogenic acid, atractylenolideⅠ, pac...
We present a reliable method of PHY-layer fingerprinting of IEEE 802.15.4-conformant nodes with commodity digital radio chips widely used in building inexpensive IEEE 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they can fingerprint; our method does not require a software-defined radio and use...
Tools for active remote operating system fingerprinting generate many packets and are easily detected by host and network defensive devices such as IDS/NIDS. Since each additional packet increases the probability of detection, it is advantageous to minimize the number of probe packets. We make use of an informationtheoretic measure of test quality to evaluate fingerprinting probes and use this ...
In recent years, WiFi fingerprint-based localization has received much attention due to its deployment practicability. In this work, we investigate the impact of different indoor environmental factors on the performance of WiFi-fingerprinting. We find that, WiFi-fingerprinting highly depends on the deployed indoor environment. In an open space, it is quite challenging to find spatially varying ...
The early history of "DNA fingerprinting" in the UK might have been different were it not for the accounts of two dramatic courtroom trials, made by the participants and the media, in the mid-1980s. But these reports, which misrepresented the importance DNA evidence had in the trials, left a strong impression on the British public and on judges on both sides of the Atlantic. These trials, widel...
This paper proposes a novel, non-linear collusion attack on digital fingerprinting systems. The attack is proposed for fingerprinting systems with finite alphabet but can be extended to continuous alphabet. We analyze the error probability of the attack for some classes of proposed random and deterministic schemes and obtain a bound on the number of colluders necessary to correctly estimate the...
Genetic analysis was conducted in chicken belonging to lines divergently selected for high or low frequency of skeletal defects (line H and L, respectively). The analysis was based on the DNA fingerprinting technique, using enzyme HinfI and Jeffrey’s 33.6 probe. Principal aims were: 1) to determine the effects of selection on the genetic variation within and between lines, and 2) to search for ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید