نتایج جستجو برای: authenticity
تعداد نتایج: 6831 فیلتر نتایج به سال:
We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a c...
Authenticity is an important food quality criterion. Rapid methods for confirming authenticity and detecting adulteration are widely demanded by food producers, processors, consumers and regulatory bodies. The objective of this work was to develop a model that would confirm the authenticity of Galician-labelled honeys as Galician-produced honeys. Nine metals were determined in 42 honey samples ...
A popular paradigm for achieving privacy plus authenticity is to append some “redundancy” to the data before encrypting. We investigate the security of this paradigm at both a general and a speci£c level. We consider various possible notions of privacy for the base encryption scheme, and for each such notion we provide a condition on the redundancy function that is necessary and suf£cient to en...
Andrea Westlund’s ‘Rethinking Relational Autonomy’ and Catriona Mackenzie and Jacqui Poltera’s ‘Narrative Integration, Fragmented Selves and Autonomy’ have many overlapping themes. In what follows, I draw out one of the overlapping themes: both articles distinguish between the necessary conditions for ‘identity’ or cross-temporal agency and the necessary conditions for autonomy. I suggest that ...
Discussions concerning transsexual identities consider the self representations of transsexuals as either determined through medical discourses and practices, and thus as constructed and inauthentic or, alternatively, as expressive of an interior and thus ‘authentic’ essential self. In contrast to each of these arguments, this paper highlights the significance of social interaction to transsexu...
The increasing popularity and importance of electronic commerce is evident today. However, global electronic commerce will not fully develop its immense potential unless trust is fully established. Digital certificates and electronic signature contribute to increase confidence and security by providing authenticity. However, authenticity on its own is not enough to provide trust. A credible ser...
As the amount of information resources on the Web keeps increasing so are the concerns for information integrity, confidentiality and authenticity. In Web 2.0 users are producers as well as consumers of content and metadata, which makes guaranteeing the authenticity and integrity of information critical. The scale of the Web requires that any proposals in this direction require minimal (if any)...
Control of honey frauds is needed in Ecuador to protect bee keepers and consumers because simple syrups and new syrups with eucalyptus are sold as genuine honeys. Authenticity of Ecuadorian commercial honeys was tested with a vortex emulsion consisting on one volume of honey:water (1:1) dilution, and two volumes of diethyl ether. This method allows a separation of phases in one minute to discri...
In order to help our students learn English more effectively, we teachers of English need to place an equal emphasis both on designing suitable teaching materials and making use of effective teaching methodologies. Of the two types of teaching materials; namely authentic and non-authentic materials that are being used nowadays in schools and universities in most EFL countries, the use of the fo...
Secrecy and authenticity properties of protocols are mutually dependent: every authentication is based on some secrets, and every secret must be authenticated. This interdependency is a significant source of complexity in reasoning about security. We describe a method to simplify it, by encapsulating the authenticity assumptions needed in the proofs of secrecy. This complements the method for e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید