نتایج جستجو برای: composite fingerprinting

تعداد نتایج: 130702  

1996
Birgit Pfitzmann Matthias Schunter

Fingerprinting schemes deter people from illegal copying of digital data by enabling the merchant of the data to identify the original buyer of a copy that was redistributed illegally. All known fingerprinting schemes are symmetric in the following sense: Both the buyer and the merchant know the fingerprinted copy. Thus, when the merchant finds this copy somewhere, there is no proof that it was...

2005
Vafa D. Izadinia Jan H. P. Eloff Derrick G. Kourie

This paper addresses some of the discriminants that make IPSec tunnel fingerprinting possible. Fingerprinting of VPN-tunnel endpoints may be desirable for forensic purposes, but in the hands of individuals of ill-intent, it undermines an enterprise network’s perimeter security. Three ways of preventing the ill-use of this type of fingerprinting are presented. The first two, apply to enterprises...

Bo-Chu Wang Qi-Yi He Shui-Ping Yang xian yang, Xiao-Dong Yu Xue Zhang

The aim of this paper is to develop a rapid, and highly sensitive quantitative HPLC fingerprint method with multiple indicators by using the Compound Chinese Medicine Wuwei Changyanning granule and 5 herbs in the prescription. The quantitative fingerprint chromatogram with multiple indicators was investigated. ⅰ)6 compositions included rutin, gallic acid, chlorogenic acid, atractylenolideⅠ, pac...

2014
Ira Ray Jenkins Rebecca Shapiro Sergey Bratus Ryan Speers Travis Goodspeed

We present a reliable method of PHY-layer fingerprinting of IEEE 802.15.4-conformant nodes with commodity digital radio chips widely used in building inexpensive IEEE 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they can fingerprint; our method does not require a software-defined radio and use...

2007
Lloyd G. Greenwald Tavaris J. Thomas

Tools for active remote operating system fingerprinting generate many packets and are easily detected by host and network defensive devices such as IDS/NIDS. Since each additional packet increases the probability of detection, it is advantageous to minimize the number of probe packets. We make use of an informationtheoretic measure of test quality to evaluate fingerprinting probes and use this ...

2013
Banghui Lu Jianwei Niu Junghyun Jun Long Cheng Yu Gu

In recent years, WiFi fingerprint-based localization has received much attention due to its deployment practicability. In this work, we investigate the impact of different indoor environmental factors on the performance of WiFi-fingerprinting. We find that, WiFi-fingerprinting highly depends on the deployed indoor environment. In an open space, it is quite challenging to find spatially varying ...

Journal: :Endeavour 2005
Jay D Aronson

The early history of "DNA fingerprinting" in the UK might have been different were it not for the accounts of two dramatic courtroom trials, made by the participants and the media, in the mid-1980s. But these reports, which misrepresented the importance DNA evidence had in the trials, left a strong impression on the British public and on judges on both sides of the Atlantic. These trials, widel...

Journal: :CoRR 2016
Jalal Etesami Negar Kiyavash

This paper proposes a novel, non-linear collusion attack on digital fingerprinting systems. The attack is proposed for fingerprinting systems with finite alphabet but can be extended to continuous alphabet. We analyze the error probability of the attack for some classes of proposed random and deterministic schemes and obtain a bound on the number of colluders necessary to correctly estimate the...

2007
Mariusz Sacharczuk Rafał Parada Kazimierz Jaszczak

Genetic analysis was conducted in chicken belonging to lines divergently selected for high or low frequency of skeletal defects (line H and L, respectively). The analysis was based on the DNA fingerprinting technique, using enzyme HinfI and Jeffrey’s 33.6 probe. Principal aims were: 1) to determine the effects of selection on the genetic variation within and between lines, and 2) to search for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید