نتایج جستجو برای: tamper shape
تعداد نتایج: 192340 فیلتر نتایج به سال:
For 2D vector maps, obtaining high tamper localization accuracy without requiring extra space is a technically challenging problem. Using an adaptive group division approach and an improved reversible data hiding approach, the author proposes a reversible fragile watermarking method for locating tampered Polylines/Polygons in 2D vector maps. In particular, the author adaptively divide the featu...
It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec’11, Li et al. showed that Kim and Chung’s passwordbased remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an...
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay require a large amount of on-chip memory to provide tamper-proof storage for metadata such as hash values or nonces. Tree-based strategies can be deployed to reduce this unacceptable overhead; for example, the well-kno...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید