Suggested Topics within your search.
Suggested Topics within your search.
-
141
THE ETHICAL PROBLEMS OF ARCHITECTURAL RECONSTRUCTION – HUNGARIAN CASE STUDIES
Published 2019-12-01“…The main rule is: deceit, forgery, falsification is forbidden. Despite this, some reconstructions were undertaken in Hungary, and recently the pressure for reconstructions has become even greater. …”
Get full text
Article -
142
Enhancing Security and Authenticity in Immersive Environments
Published 2025-03-01“…Simulations of tampering and forgery attacks further validated the system’s capability to detect unauthorized modifications, with a 100% detection rate observed across multiple trials. …”
Get full text
Article -
143
Multi-scale CNN-CrossViT network for offline handwritten signature recognition and verification
Published 2025-07-01“…However, with the continuous advancement of forgery technology, the differences in features between forgery signatures and genuine signatures have become increasingly subtle, which undoubtedly increases the difficulty of signature verification. …”
Get full text
Article -
144
Authenticity doubt on the Tomioka (Yishen Lun) manuscript: A discourse analysis
Published 2024-12-01“…This article argues that the case for forgery is neither well-established nor proven, making the proposal for exclusion premature.…”
Get full text
Article -
145
Przestępstwo fałszu intelektualnego dokumentu w postaci faktury
Published 2021-01-01“…The article discusses the issue of intellectual forgery of documents in the form of invoices. It describes the current criminal regulation of the crime, its features and the threat of punishment. …”
Get full text
Article -
146
L’étranger, le soldat et le bandit. Trois figures judiciaires du faux-monnayage hispanique transfrontalier à la fin du XVIIe siècle
Published 2011-11-01“…The foreigner, the demobilized soldier and the bandit are three main figures of the forgery Hispanic monnayage which pursue the courts of king Charles II (1665-1700) in the border spaces of Spain at the end of the XVIIth century. …”
Get full text
Article -
147
Provably secure certificate less blind proxy re-signatures
Published 2012-09-01“…Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme.While achieving message privacy features of the proxy signature conversion.Based on the difficulty of NGBH and Many-NGBH problem,It proves that the new scheme can resist forgery attack characteristics.The scheme satisfies security properties:correctness and message blindness.…”
Get full text
Article -
148
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
Published 2011-01-01“…The security and flaw of the two anonymous signature schemes called ZLW(2008) and LHMM(2009) were analyzed,where the ZLW scheme couldn’t provide signed message verifiability and the LHMM scheme couldn’t resist on the multiple-known-signature existential forgery.A novel anonymous signature scheme was proposed that enforced the security level to Model3 security and reduced the computational cost,which only needed two multiple calculations in G in signing phase and n+1 bilinear pairing operators in verifying algorithm.…”
Get full text
Article -
149
Efficient group signature scheme with revocation
Published 2016-10-01“…A group signature scheme which combines the subset cover framework with Camenisch-Stadler scheme was proposed.This scheme allowed any group members’ entrance and revocation without changing other members’ secret key.Meanwhile,the scheme added a knowledge signature while registering,that realized coalition resistance.It is shown that the scheme not only has the characteristics of anonymity and no-relation,but also can resist conspiracy attacks,forgery attack and authority trap attack.As for efficiency,the scheme just slightly increases the length of group members’ certificates,with the signature and verification complexity remaining at constant level.…”
Get full text
Article -
150
La zurriaga: unas «octavas seriojocosas» atribuidas a Quevedo
Published 2024-05-01“…The text, dated in 1632 in the burlesque preliminaries, was considered apocryphal by different editors, who proposed the eighteenth century as the time of composition and considered it a mere forgery of the Count of Saceda. Such disqualification implied the total oblivion of these verses, hitherto unknown. …”
Get full text
Article -
151
Survey of the Stability of Uniqueness of Muscle Synergy Patterns in Handwritten Signature over Time
Published 2023-09-01“…Finally, the patterns extracted by the SVM classifier are classified into two classes: genuine and forgery signatures.…”
Get full text
Article -
152
Detection algorithm of electronic disguised voice based on convolutional neural network
Published 2018-02-01“…An electronic disguised voice detection algorithm based on the statistical features of MFCC and the convolution neural network was proposed.Firstly,the statistical features of MFCC were extracted and reconstructed as the input of convolution neural network.Considering the convolution kernel size,the number of convolution kernels and the pooling size,24 different network structures were evaluated in this work.Finally,the convolution neural network structure which could be effectively used for electronic disguised voice detection was determined.The experimental results show that the proposed algorithm can effectively detect the trace of electronic disguising.Meanwhile,the specific forgery operation of the electronic disguised voice can also be estimated.…”
Get full text
Article -
153
Lattice-based ring signcryption for consortium blockchain
Published 2023-07-01“…CB-LRSCS also has the characteristics of high efficiency, anti-quantum, anti-forgery, confidentiality and unconditional anonymity, and it can be applied in the electronic finance system.…”
Get full text
Article -
154
Application-aware IPv6 networking
Published 2020-08-01“…,service level agreement,SLA).A framework called application-aware IPv6 networking (APN6) was proposed,which could encapsulate applications’ requirements into packets.Networks could be aware of an application’s requirements and perform traffic steering and network resource adjustment.Besides,a secure access control mechanism was designed to solve application information forgery and tampering issues in APN6,which ensured that APN6 only provided services to legal users.…”
Get full text
Article -
155
An Algorithm for Ultrasonic Identification of Ceramic Materials and Virtual Prototype Realization
Published 2024-07-01“…To prevent important items from being replaced by a forgery, an ultrasonic fingerprint identification algorithm is proposed and an identification program is developed. …”
Get full text
Article -
156
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01“…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
Get full text
Article -
157
RESPONSIBILITY OF MARKETPLACES FOR VIOLATIONS OF INTELLECTUAL RIGHTS
Published 2023-03-01“…Along with the emergence of special platforms for online trading, the number of cases of trademark forgery and other violations of intellectual rights has increased. …”
Get full text
Article -
158
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01“…In order to overcome the drawbacks of current attribute-based signature (ABS) schemes in terms of security,efficiency and signing policy,Ma,et al.and Cao,et al.respectively proposed a threshold ABS with single attribute au-thority and a multi-authority ABS with signing policy supporting AND,OR,threshold gates,and presented the security proof of their schemes under computational Diffie-Hellman assumption.Both schemes were demonstrated have security pitfalls by presenting specified attacks against them.Specifically,their schemes are all vulnerable to forgery attack.Thus,they are not feasible for practical applications.In addition,the cause of the flaws in these ABS schemes are presented,as well as an improvement of Ma et al.'…”
Get full text
Article -
159
An efficient blockchain-based privacy preservation scheme for smart grids
Published 2025-04-01“…In this paper, we propose a blockchain-based solution to preserve user’s privacy in smart grids and to mitigates data forgery, profiling, and man-in-the-middle attacks. …”
Get full text
Article -
160
Provably secure partially blind signature without trusted PKG
Published 2010-01-01“…Under the random oracle model, the proposed scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
Get full text
Article