نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

Journal: :Expert opinion on drug delivery 2013
Laura M Lourenço Michele Matthews Robert N Jamison

INTRODUCTION In recent years, attention has been given to the development of abuse-deterrent and tamper-resistant opioid formulations in light of concern over the growing misuse and abuse of opioids prescribed for the treatment of chronic pain. AREAS COVERED This critical review discusses abuse-deterrent and tamper-resistant formulations, which may help to overcome concerns of misuse in using...

Journal: :IACR Cryptology ePrint Archive 2015
Carmit Hazay Antigoni Polychroniadou Muthuramakrishnan Venkitasubramaniam

Secure computation in the presence of tamper-proof hardware tokens is proven under the assumption that the holder of the token is only given black-box access to the functionality of the token. Starting with the work of Goldreich and Ostrovsky [GO96], a long series of works studied tamper-proof hardware for realizing two-party functionalities in a variety of settings. In this work we focus our a...

Journal: :IACR Cryptology ePrint Archive 2016
Jeremias Mechler Jörn Müller-Quade Tobias Nilges

Universally composable protocols provide security even in highly complex environments like the Internet. Without setup assumptions, however, UC-secure realizations of cryptographic tasks are impossible. To achieve efficient protocols, practical setup assumptions are needed. Tamper-proof hardware tokens, e.g. smart cards and USB tokens, can be used for this purpose. Apart from the fact that they...

Journal: :Computer Standards & Interfaces 2007
Tzungher Chen Gwoboa Horng

Gradually, copyright-protection protocols have attracted much attention in that they provide effective copyright protection mechanisms. Asymmetric copyright-protection protocols allow the buyer to know and possess the protected content yet the seller has no idea about it. Subsequently, if an illegal copy is found, the seller can identify the buyer by cooperating with a trusted third party. Most...

2011
Yuki Kinebuchi Shakeel Butt Vinod Ganapathy Liviu Iftode Tatsuo Nakajima

System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and inspect pages containing code and data of a target system under study. To avoid being infected by malicious or compromised targets, state of the art system integrity monitors rely on virtualization technology to set up a tamper-proof execution environment. Consequently, the virtualization infrastru...

2012
Paul Singh

This paper investigates and reviews literature regarding a range of topics important to the research question – the themes apply across all the topics. The topics include label and package warnings, including tamper-evident features, to review their effect on the consumer behaviour of changing usage or purchase decisions. This information was then applied to gain insight into anticounterfeit pr...

2011
Lamiaa M. El Bakrawy Neveen I. Ghali Tai-hoon Kim Aboul ella Hassanien

In this paper, we propose a fragile watermarking hybrid approach using rough set kmeans and exponential particle swarm optimization (EPSO) systems. It is based on a block-wise dependency mechanism which can detect any alterations made to the protected image. Initially, the input image is divided into blocks with equal size in order to improve image tamper localization precision. Then feature se...

1996
Wenbo Mao

Electronic cash should be revocable in order to nullify the effect of attacks mounted by a capable attacker (e.g., double spending by reverse-engineering tamper-resistant devices). For prudent engineering considerations, cash revocability forms a necessary complementary measure to using tamper-resistant devices, adding system security while lowering system cost by reducing the level of physical...

2009
Graham Steel

Security solutions for information systems are increasingly making use of tamper-resistant cryptographic devices, whether they are smartcards carried by commuters on a mass transit system, or high-throughput Hardware Security Modules in a bank ATM transaction processing processing facility. Over the last few years we have been analysing the key management APIs of such tamper-resistant devices. ...

2016
V. Pankajakshan C. Culnane J. C. Chuang Y. C. Hu

This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید