Suggested Topics within your search.
Suggested Topics within your search.
-
161
Efficient ID-based certificateless signature scheme
Published 2008-01-01“…Under the random oracle model, the new scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
Get full text
Article -
162
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01“…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
Get full text
Article -
163
Le faux-monnayage dans le Puy-de-Dôme du Second Empire à la Belle Époque : du mythe à la réalité
Published 2011-12-01“…The representation of the forgery - monnayage in the local press in the XIXth century and in the Belle Epoque has this of specific that it is subjected to two ideas that we are made of the crime, that of a mythical criminality printed by folklore and by mystery, and that of insignificant acts committed by individuals and in completely commonplace conditions, even insignificant. …”
Get full text
Article -
164
Software-defined network packet forwarding verification scheme based on attribute-based signatures identification
Published 2021-06-01“…Aiming at the lack of effective forwarding verification mechanism for packet in software defined network (SDN), a data packet forwarding verification scheme based on attributed-based signatures identification was proposed.First, the attribute signature identification was generated according to the user's identity attribute, and the data packet was marked by the attribute signature identification.Then, the P4 forwarding device was used to control accurately and sample the data packet.The controller verified the attribute signature of the sampled data packet.The OpenFlow forwarding device processes the abnormal data packets according to the flow table issued by the controller.Finally, a multi-controllers architecture was constructed to avoid the single point failure of the controller.The results of the experiment indicate that the scheme can achieve accurate control and sampling of data packet, effectively detect the forwarding abnormal behaviors such as packet tampering and forgery, and the network delay is within the range of feasible communication delay.…”
Get full text
Article -
165
Some Numeric Data on Crime and Criminals in Istanbul (1876-1880)
Published 2022-12-01“…For this purpose, the article analyzes statistical information regarding crimes such as homicide, larceny, extortion, bodily harm, rape, and forgery that were committed in Istanbul during the specified period as well as the individuals who committed these crimes.…”
Get full text
Article -
166
An improved strong designated verifier signature scheme
Published 2018-12-01“…However, we show that their scheme is not secure against forgery attack and propose an improved strong designated verifier signature scheme using symmetrical encryption technology. …”
Get full text
Article -
167
One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
Published 2009-01-01“…Theoretical analysis and experimental results indicate that the proposed algorithm can satisfy the required security performance, such as data compression function, irreversibility, initial value sensitivity forgery resistance and collision resistance. Compared with some existing methods, the proposed scheme possesses better collision resistance performance.…”
Get full text
Article -
168
Ewolucja instrumentów prawnych ochrony wiarygodności dokumentów w systemie common law na przykładzie Irlandii zależnej i niepodległej
Published 2018-10-01“…The aim of the analysis presented in the following article is to delineate the historical outline and the evolution of the criminal law regulations in the area of forgery of documents in Ireland under foreign rule and in independent Ireland. …”
Get full text
Article -
169
The Hypothesis of the Arsacids’ Descent from the Achaemenids: Myth or Reality?
Published 2025-03-01“…Neusner and their followers, it is an "ideological fiction", a "literary forgery", which appeared in the period between the second half of II century BC and the beginning of the I century AD and was recorded in written form by Arrian. …”
Get full text
Article -
170
The Hypothesis of the Arsacids’ Descent from the Achaemenids: Myth or Reality?
Published 2025-03-01“…Neusner and their followers, it is an "ideological fiction", a "literary forgery", which appeared in the period between the second half of II century BC and the beginning of the I century AD and was recorded in written form by Arrian. …”
Get full text
Article -
171
The Hypothesis of the Arsacids’ Descent from the Achaemenids: Myth or Reality?
Published 2025-03-01“…Neusner and their followers, it is an "ideological fiction", a "literary forgery", which appeared in the period between the second half of II century BC and the beginning of the I century AD and was recorded in written form by Arrian. …”
Get full text
Article -
172
Chalcolithic stamp seals from Tepe Gheshlagh, and a look into their application in ownership and exchange systems
Published 2025-08-01“…A structural analysis of the glyptic iconography suggested that each of the linear, circular, or repeating patterns were less mere personal insignias intended to exclude the possibility of alteration or forgery than they were marks belonging to a pre-literate system where each sign/symbol stood for individual commodity types that were transported or exchanged as such. …”
Get full text
Article -
173
A Comprehensive Evaluation of Deepfake Detection Methods: Approaches, Challenges and Future Prospects
Published 2025-01-01“…Advances in technology have made deepfake forgeries easier, posing serious ethical and security risks that highlight the urgent need for better detection methods. …”
Get full text
Article -
174
The Volga Plot in the Works of E. Chirikov and A. Tolstoy
Published 2025-06-01“…Chirikov’s Volga fairy tales with fragments of Tolstoy’s trilogy The Road to Calvary, which take place on the Volga, the author concludes that if Chirikov’s Volga is the last truth and constant in the world of forgery and entropy, then Tolstoy is the condition and reason for the adventures sought and greedily acquired by the characters and the author. …”
Get full text
Article -
175
SM2 asynchronous remote key generation based account recovery protocol in industrial Internet
Published 2025-05-01“…The openness network environment of the industrial Internet may lead to security risks such as identity forgery and data leakage, making it crucial to achieve effective authentication and ensure account security. …”
Get full text
Article -
176
The harms of using the rule of tolerance in the arguments of Sunnah in the field of moral traditions
Published 2020-08-01“…The lack of knowledge of moral jurisprudence in related narratives and the lack of separation of moral and informational propositions have led to the acceptance of the rule and consequently disruptions to the Islamic ethics system, the occurrence of forgery in the moral traditions, and the emergence of pessimism about moral narratives. …”
Get full text
Article -
177
A Blockchain-Integrated Federated Learning Approach for Secure Data Sharing and Privacy Protection in Multi-Device Communication
Published 2025-12-01“…The secure transmission of communication data between different devices still faces numerous potential challenges, such as data tampering, data integrity, network attacks, and the risks of information leakage or forgery. This approach aims to handle the distributed trust issues of federated learning users and update data states rapidly. …”
Get full text
Article -
178
The Central Exam Crimes as Defined by Law No. 6114 Placement Center Presidency
Published 2023-06-01“…Relatedly, Article 10 of this law also defines certain crimes specific to exams in addition to document forgery and malfeasance, taking these crimes into consideration alongside their elements. …”
Get full text
Article -
179
Enhancing Autonomous Vehicle Safety with Blockchain Technology: Securing Vehicle Communication and AI Systems
Published 2024-12-01“…Blockchain’s decentralized ledger ensures the integrity of data exchange between vehicles and smart city infrastructure and mitigates the risks of cyberattacks such as data manipulation and identity forgery. This paper also examines recent advances in vehicular ad hoc networks (VANETs) and vehicular social networks (VSNs), and it demonstrates how the immutability and cryptographic security of the blockchain can strengthen AV systems. …”
Get full text
Article -
180
Classification of Real and Fake Images Using Error Level Analysis Technique and MobileNetV2 Architecture
Published 2025-05-01“…Advancements in technology have made image forgery increasingly difficult to detect, raising the risk of misinformation on social media. …”
Get full text
Article