Showing 141 - 160 results of 296 for search '"Forgery"', query time: 0.04s Refine Results
  1. 141

    THE ETHICAL PROBLEMS OF ARCHITECTURAL RECONSTRUCTION – HUNGARIAN CASE STUDIES by Ádám Arnóth

    Published 2019-12-01
    “…The main rule is: deceit, forgery, falsification is forbidden. Despite this, some reconstructions were undertaken in Hungary, and recently the pressure for reconstructions has become even greater. …”
    Get full text
    Article
  2. 142

    Enhancing Security and Authenticity in Immersive Environments by Rebecca Acheampong, Dorin-Mircea Popovici, Titus Balan, Alexandre Rekeraho, Manuel Soto Ramos

    Published 2025-03-01
    “…Simulations of tampering and forgery attacks further validated the system’s capability to detect unauthorized modifications, with a 100% detection rate observed across multiple trials. …”
    Get full text
    Article
  3. 143

    Multi-scale CNN-CrossViT network for offline handwritten signature recognition and verification by Wanying Li, Mahpirat Muhammat, Xuebin Xu, Alimjan Aysa, Kurban Ubul

    Published 2025-07-01
    “…However, with the continuous advancement of forgery technology, the differences in features between forgery signatures and genuine signatures have become increasingly subtle, which undoubtedly increases the difficulty of signature verification. …”
    Get full text
    Article
  4. 144

    Authenticity doubt on the Tomioka (Yishen Lun) manuscript: A discourse analysis by David Tam

    Published 2024-12-01
    “…This article argues that the case for forgery is neither well-established nor proven, making the proposal for exclusion premature.…”
    Get full text
    Article
  5. 145

    Przestępstwo fałszu intelektualnego dokumentu w postaci faktury by Anna Wochowska-Petrykowska

    Published 2021-01-01
    “…The article discusses the issue of intellectual forgery of documents in the form of invoices. It describes the current criminal regulation of the crime, its features and the threat of punishment. …”
    Get full text
    Article
  6. 146

    L’étranger, le soldat et le bandit. Trois figures judiciaires du faux-monnayage hispanique transfrontalier à la fin du XVIIe siècle by Olivier Caporossi

    Published 2011-11-01
    “…The foreigner, the demobilized soldier and the bandit are three main figures of the forgery Hispanic monnayage which pursue the courts of king Charles II (1665-1700) in the border spaces of Spain at the end of the XVIIth century. …”
    Get full text
    Article
  7. 147

    Provably secure certificate less blind proxy re-signatures by Tao FENG, Yi-xin LIANG

    Published 2012-09-01
    “…Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme.While achieving message privacy features of the proxy signature conversion.Based on the difficulty of NGBH and Many-NGBH problem,It proves that the new scheme can resist forgery attack characteristics.The scheme satisfies security properties:correctness and message blindness.…”
    Get full text
    Article
  8. 148

    Cryptanalysis and design of signature schemes with identity ambiguity in the standard model by ZHANG Ming-wu1, YANG Bo1, YAO Jin-tao1, ZHANG Wen-zheng2

    Published 2011-01-01
    “…The security and flaw of the two anonymous signature schemes called ZLW(2008) and LHMM(2009) were analyzed,where the ZLW scheme couldn’t provide signed message verifiability and the LHMM scheme couldn’t resist on the multiple-known-signature existential forgery.A novel anonymous signature scheme was proposed that enforced the security level to Model3 security and reduced the computational cost,which only needed two multiple calculations in G in signing phase and n+1 bilinear pairing operators in verifying algorithm.…”
    Get full text
    Article
  9. 149

    Efficient group signature scheme with revocation by Hong ZHONG, Cong-lin HUANG, Yan XU, Jie CUI

    Published 2016-10-01
    “…A group signature scheme which combines the subset cover framework with Camenisch-Stadler scheme was proposed.This scheme allowed any group members’ entrance and revocation without changing other members’ secret key.Meanwhile,the scheme added a knowledge signature while registering,that realized coalition resistance.It is shown that the scheme not only has the characteristics of anonymity and no-relation,but also can resist conspiracy attacks,forgery attack and authority trap attack.As for efficiency,the scheme just slightly increases the length of group members’ certificates,with the signature and verification complexity remaining at constant level.…”
    Get full text
    Article
  10. 150

    La zurriaga: unas «octavas seriojocosas» atribuidas a Quevedo by María José Alonso Veloso

    Published 2024-05-01
    “…The text, dated in 1632 in the burlesque preliminaries, was considered apocryphal by different editors, who proposed the eighteenth century as the time of composition and considered it a mere forgery of the Count of Saceda. Such disqualification implied the total oblivion of these verses, hitherto unknown. …”
    Get full text
    Article
  11. 151

    Survey of the Stability of Uniqueness of Muscle Synergy Patterns in Handwritten Signature over Time by Arsalan Asemi, Fereidoun Nowshiravan Rahatabad, Hamid Azadeh

    Published 2023-09-01
    “…Finally, the patterns extracted by the SVM classifier are classified into two classes: genuine and forgery signatures.…”
    Get full text
    Article
  12. 152

    Detection algorithm of electronic disguised voice based on convolutional neural network by Hongwei XU, Diqun YAN, Fan YANG, Rangding WANG, Chao JIN, Li XIANG

    Published 2018-02-01
    “…An electronic disguised voice detection algorithm based on the statistical features of MFCC and the convolution neural network was proposed.Firstly,the statistical features of MFCC were extracted and reconstructed as the input of convolution neural network.Considering the convolution kernel size,the number of convolution kernels and the pooling size,24 different network structures were evaluated in this work.Finally,the convolution neural network structure which could be effectively used for electronic disguised voice detection was determined.The experimental results show that the proposed algorithm can effectively detect the trace of electronic disguising.Meanwhile,the specific forgery operation of the electronic disguised voice can also be estimated.…”
    Get full text
    Article
  13. 153

    Lattice-based ring signcryption for consortium blockchain by Huifang Yu, Zhirui Lv

    Published 2023-07-01
    “…CB-LRSCS also has the characteristics of high efficiency, anti-quantum, anti-forgery, confidentiality and unconditional anonymity, and it can be applied in the electronic finance system.…”
    Get full text
    Article
  14. 154

    Application-aware IPv6 networking by Lin HE, Peng KUANG, Shicheng WANG, Ying LIU, Xing LI, Shuping PENG

    Published 2020-08-01
    “…,service level agreement,SLA).A framework called application-aware IPv6 networking (APN6) was proposed,which could encapsulate applications’ requirements into packets.Networks could be aware of an application’s requirements and perform traffic steering and network resource adjustment.Besides,a secure access control mechanism was designed to solve application information forgery and tampering issues in APN6,which ensured that APN6 only provided services to legal users.…”
    Get full text
    Article
  15. 155

    An Algorithm for Ultrasonic Identification of Ceramic Materials and Virtual Prototype Realization by Yu LIU, Xiping HE, Shengping HE

    Published 2024-07-01
    “…To prevent important items from being replaced by a forgery, an ultrasonic fingerprint identification algorithm is proposed and an identification program is developed. …”
    Get full text
    Article
  16. 156

    Efficient ID-based multicast authentication protocol in wireless sensor networks by WANG Gang1, WEN Tao1, GUO Quan2, MA Xue-bin1

    Published 2009-01-01
    “…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
    Get full text
    Article
  17. 157

    RESPONSIBILITY OF MARKETPLACES FOR VIOLATIONS OF INTELLECTUAL RIGHTS by MALYUSHEV A.V., SINELNIKOVA V.G.

    Published 2023-03-01
    “…Along with the emergence of special platforms for online trading, the number of cases of trademark forgery and other violations of intellectual rights has increased. …”
    Get full text
    Article
  18. 158

    Security analysis and improvement of two attribute-based signature schemes by Xiao YANG, Guang-li XIANG, Jiang-hong WEI, Rui-zong SUN

    Published 2016-10-01
    “…In order to overcome the drawbacks of current attribute-based signature (ABS) schemes in terms of security,efficiency and signing policy,Ma,et al.and Cao,et al.respectively proposed a threshold ABS with single attribute au-thority and a multi-authority ABS with signing policy supporting AND,OR,threshold gates,and presented the security proof of their schemes under computational Diffie-Hellman assumption.Both schemes were demonstrated have security pitfalls by presenting specified attacks against them.Specifically,their schemes are all vulnerable to forgery attack.Thus,they are not feasible for practical applications.In addition,the cause of the flaws in these ABS schemes are presented,as well as an improvement of Ma et al.'…”
    Get full text
    Article
  19. 159

    An efficient blockchain-based privacy preservation scheme for smart grids by Mohamad Badra, Rouba Borghol

    Published 2025-04-01
    “…In this paper, we propose a blockchain-based solution to preserve user’s privacy in smart grids and to mitigates data forgery, profiling, and man-in-the-middle attacks. …”
    Get full text
    Article
  20. 160

    Provably secure partially blind signature without trusted PKG by FENG Tao1, PENG Wei1, MA Jian-feng3

    Published 2010-01-01
    “…Under the random oracle model, the proposed scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
    Get full text
    Article