نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

Journal: :IJDCF 2016
Nana Wang

For 2D vector maps, obtaining high tamper localization accuracy without requiring extra space is a technically challenging problem. Using an adaptive group division approach and an improved reversible data hiding approach, the author proposes a reversible fragile watermarking method for locating tampered Polylines/Polygons in 2D vector maps. In particular, the author adaptively divide the featu...

Journal: :IACR Cryptology ePrint Archive 2012
Ding Wang Chunguang Ma Peng Wu

It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec’11, Li et al. showed that Kim and Chung’s passwordbased remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an...

2007
Reouven Elbaz David Champagne Ruby B. Lee Lionel Torres Gilles Sassatelli Pierre Guillemin

Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay require a large amount of on-chip memory to provide tamper-proof storage for metadata such as hash values or nonces. Tree-based strategies can be deployed to reduce this unacceptable overhead; for example, the well-kno...

Journal: :International Journal of Security and Its Applications 2013

Journal: :International Journal of Digital Crime and Forensics 2021

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید