Showing 161 - 180 results of 296 for search '"Forgery"', query time: 0.04s Refine Results
  1. 161

    Efficient ID-based certificateless signature scheme by LIU Jing-wei, SUN Rong, MA Wen-ping

    Published 2008-01-01
    “…Under the random oracle model, the new scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
    Get full text
    Article
  2. 162

    Efficient ID-based multicast authentication protocol in wireless sensor networks by WANG Gang1, WEN Tao1, GUO Quan2, MA Xue-bin1

    Published 2009-01-01
    “…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
    Get full text
    Article
  3. 163

    Le faux-monnayage dans le Puy-de-Dôme du Second Empire à la Belle Époque : du mythe à la réalité by Sébastien Soulier

    Published 2011-12-01
    “…The representation of the forgery - monnayage in the local press in the XIXth century and in the Belle Epoque has this of specific that it is subjected to two ideas that we are made of the crime, that of a mythical criminality printed by folklore and by mystery, and that of insignificant acts committed by individuals and in completely commonplace conditions, even insignificant. …”
    Get full text
    Article
  4. 164

    Software-defined network packet forwarding verification scheme based on attribute-based signatures identification by Chaowen CHANG, Jianshu JIN, Peisheng HAN, Xianwei ZHU

    Published 2021-06-01
    “…Aiming at the lack of effective forwarding verification mechanism for packet in software defined network (SDN), a data packet forwarding verification scheme based on attributed-based signatures identification was proposed.First, the attribute signature identification was generated according to the user's identity attribute, and the data packet was marked by the attribute signature identification.Then, the P4 forwarding device was used to control accurately and sample the data packet.The controller verified the attribute signature of the sampled data packet.The OpenFlow forwarding device processes the abnormal data packets according to the flow table issued by the controller.Finally, a multi-controllers architecture was constructed to avoid the single point failure of the controller.The results of the experiment indicate that the scheme can achieve accurate control and sampling of data packet, effectively detect the forwarding abnormal behaviors such as packet tampering and forgery, and the network delay is within the range of feasible communication delay.…”
    Get full text
    Article
  5. 165

    Some Numeric Data on Crime and Criminals in Istanbul (1876-1880) by Adem Korkmaz

    Published 2022-12-01
    “…For this purpose, the article analyzes statistical information regarding crimes such as homicide, larceny, extortion, bodily harm, rape, and forgery that were committed in Istanbul during the specified period as well as the individuals who committed these crimes.…”
    Get full text
    Article
  6. 166

    An improved strong designated verifier signature scheme by Chao Li, SongSong Zhang, Yilai Zhang, Yong Xie

    Published 2018-12-01
    “…However, we show that their scheme is not secure against forgery attack and propose an improved strong designated verifier signature scheme using symmetrical encryption technology. …”
    Get full text
    Article
  7. 167

    One-way hash function construction based on Chen-type hyper-chaotic system and key-stream by REN Hai-peng, ZHUANG Yuan

    Published 2009-01-01
    “…Theoretical analysis and experimental results indicate that the proposed algorithm can satisfy the required security performance, such as data compression function, irreversibility, initial value sensitivity forgery resistance and collision resistance. Compared with some existing methods, the proposed scheme possesses better collision resistance performance.…”
    Get full text
    Article
  8. 168

    Ewolucja instrumentów prawnych ochrony wiarygodności dokumentów w systemie common law na przykładzie Irlandii zależnej i niepodległej by Izabela Jankowska-Prochot

    Published 2018-10-01
    “…The aim of the analysis presented in the following article is to delineate the historical outline and the evolution of the criminal law regulations in the area of forgery of documents in Ireland under foreign rule and in independent Ireland. …”
    Get full text
    Article
  9. 169

    The Hypothesis of the Arsacids’ Descent from the Achaemenids: Myth or Reality? by Arthur Melikyan

    Published 2025-03-01
    “…Neusner and their followers, it is an "ideological fiction", a "literary forgery", which appeared in the period between the second half of II century BC and the beginning of the I century AD and was recorded in written form by Arrian. …”
    Get full text
    Article
  10. 170

    The Hypothesis of the Arsacids’ Descent from the Achaemenids: Myth or Reality? by Arthur Melikyan

    Published 2025-03-01
    “…Neusner and their followers, it is an "ideological fiction", a "literary forgery", which appeared in the period between the second half of II century BC and the beginning of the I century AD and was recorded in written form by Arrian. …”
    Get full text
    Article
  11. 171

    The Hypothesis of the Arsacids’ Descent from the Achaemenids: Myth or Reality? by Arthur Melikyan

    Published 2025-03-01
    “…Neusner and their followers, it is an "ideological fiction", a "literary forgery", which appeared in the period between the second half of II century BC and the beginning of the I century AD and was recorded in written form by Arrian. …”
    Get full text
    Article
  12. 172

    Chalcolithic stamp seals from Tepe Gheshlagh, and a look into their application in ownership and exchange systems by Mahnaz Sharifi, Abbas Motarjem

    Published 2025-08-01
    “…A structural analysis of the glyptic iconography suggested that each of the linear, circular, or repeating patterns were less mere personal insignias intended to exclude the possibility of alteration or forgery than they were marks belonging to a pre-literate system where each sign/symbol stood for individual commodity types that were transported or exchanged as such. …”
    Get full text
    Article
  13. 173

    A Comprehensive Evaluation of Deepfake Detection Methods: Approaches, Challenges and Future Prospects by Hu Xixi

    Published 2025-01-01
    “…Advances in technology have made deepfake forgeries easier, posing serious ethical and security risks that highlight the urgent need for better detection methods. …”
    Get full text
    Article
  14. 174

    The Volga Plot in the Works of E. Chirikov and A. Tolstoy by Mikhail A. Perepelkin

    Published 2025-06-01
    “…Chirikov’s Volga fairy tales with fragments of Tolstoy’s trilogy The Road to Calvary, which take place on the Volga, the author concludes that if Chirikov’s Volga is the last truth and constant in the world of forgery and entropy, then Tolstoy is the condition and reason for the adventures sought and greedily acquired by the characters and the author. …”
    Get full text
    Article
  15. 175

    SM2 asynchronous remote key generation based account recovery protocol in industrial Internet by XIAO Hao, YANG Xue, JIANG Qi, YU Zengwen, LI Xinghua, MA Jianfeng

    Published 2025-05-01
    “…The openness network environment of the industrial Internet may lead to security risks such as identity forgery and data leakage, making it crucial to achieve effective authentication and ensure account security. …”
    Get full text
    Article
  16. 176

    The harms of using the rule of tolerance in the arguments of Sunnah in the field of moral traditions by Akram Jjafari, Alireza Del Afkar, Mohammad Sadri

    Published 2020-08-01
    “…The lack of knowledge of moral jurisprudence in related narratives and the lack of separation of moral and informational propositions have led to the acceptance of the rule and consequently disruptions to the Islamic ethics system, the occurrence of forgery in the moral traditions, and the emergence of pessimism about moral narratives. …”
    Get full text
    Article
  17. 177

    A Blockchain-Integrated Federated Learning Approach for Secure Data Sharing and Privacy Protection in Multi-Device Communication by Kejun Li

    Published 2025-12-01
    “…The secure transmission of communication data between different devices still faces numerous potential challenges, such as data tampering, data integrity, network attacks, and the risks of information leakage or forgery. This approach aims to handle the distributed trust issues of federated learning users and update data states rapidly. …”
    Get full text
    Article
  18. 178

    The Central Exam Crimes as Defined by Law No. 6114 Placement Center Presidency by Mustafa Limoncu

    Published 2023-06-01
    “…Relatedly, Article 10 of this law also defines certain crimes specific to exams in addition to document forgery and malfeasance, taking these crimes into consideration alongside their elements. …”
    Get full text
    Article
  19. 179

    Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems by Stefan Iordache, Catalina Camelia Patilea, Ciprian Paduraru

    Published 2024-12-01
    “…Blockchain’s decentralized ledger ensures the integrity of data exchange between vehicles and smart city infrastructure and mitigates the risks of cyberattacks such as data manipulation and identity forgery. This paper also examines recent advances in vehicular ad hoc networks (VANETs) and vehicular social networks (VSNs), and it demonstrates how the immutability and cryptographic security of the blockchain can strengthen AV systems. …”
    Get full text
    Article
  20. 180

    Classification of Real and Fake Images Using Error Level Analysis Technique and MobileNetV2 Architecture by Muhamad Nur Baihaqi, Aris Sugiharto, Henri Tantyoko

    Published 2025-05-01
    “…Advancements in technology have made image forgery increasingly difficult to detect, raising the risk of misinformation on social media. …”
    Get full text
    Article