Showing 181 - 200 results of 218 for search '"Tampere"', query time: 0.05s Refine Results
  1. 181

    Abuse potential of fentanyl and fentanyl analogues by Anusha Thumma, Kwadwo Mfoafo, Niloofar Babanejad, Alborz Omidian, Yadollah Omidi, Hamid Omidian

    Published 2024-11-01
    “…Conclusions: By educating patients and physicians, making rescue kits easily accessible, developing vaccines to prevent opioid addiction, and perhaps even creating new tamper-resistant fentanyl formulations, it may be possible to prevent fentanyl misuse, therapeutic errors, and the repercussions that follow.…”
    Get full text
    Article
  2. 182

    A Secure Framework for Privacy-Preserving Analytics in Healthcare Records Using Zero-Knowledge Proofs and Blockchain in Multi-Tenant Cloud Environments by S. Bharath Babu, K. R. Jothi

    Published 2025-01-01
    “…These proofs, integrated into a blockchain network, create a tamper-proof, transparent ledger that ensures secure healthcare transactions. …”
    Get full text
    Article
  3. 183

    Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras by Zhenlong Man, Jianmeng Liu, Fan Zhang, Xiangfu Meng

    Published 2025-02-01
    “…The algorithm in this paper is applied to network transmission, which can effectively prevent data eavesdropping, tampering and forgery, ensure communication security.…”
    Get full text
    Article
  4. 184

    Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network by Wei Zhang, Shanyu Tang, Liping Zhang, Zhao Ma, Jun Song

    Published 2015-01-01
    “…In an ETC system, toll transaction data are transmitted over intelligent transportation networks, which is vulnerable to eavesdropping, interfering, and tampering attacks. To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
    Get full text
    Article
  5. 185

    Revealing Traces of Image Resampling and Resampling Antiforensics by Anjie Peng, Yadong Wu, Xiangui Kang

    Published 2017-01-01
    “…The forensics of resampling plays an important role in image tampering detection, steganography, and steganalysis. …”
    Get full text
    Article
  6. 186

    Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations by Erwin Alexander Leal Piedrahita

    Published 2019-11-01
    “…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
    Get full text
    Article
  7. 187

    A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data by Zana Thalage Omar, Fadhil Salman Abed, Shaimaa Khamees Ahmed

    Published 2021-01-01
    “…Our current research provides a new algorithm for a publicly-keyed encryption system to keep bank data from tampering and theft when stored on the cloud computing platform, and our new system achieves fully Homomorphic Encryption, which allows mathematical operations to be performed on the encrypted text without the need for the original text. …”
    Get full text
    Article
  8. 188

    RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT by Guanwei Jia, Zhaoyu Shen, Hongye Sun, Jingbo Xin, Dongyu Wang

    Published 2025-01-01
    “…Traditional centralized IoT architectures often face issues such as single points of failure and insufficient reliability, while blockchain, with its decentralized and tamper-resistant properties, offers a promising solution. …”
    Get full text
    Article
  9. 189

    Sword of heaven by Richard Wilson

    Published 2019-12-01
    “…Yet, textual research has established Measure for Measure beyond question as a ‘posthumous collaboration’, and ensured we can never go back to the sovereign Shakespeare. It was Middleton’s tampering with Shakespeare’s text that transformed it from a drama of demonic substitution, focused on the ‘outward-sainted deputy’ [3.1.93] into an allegory of divine sovereignty, idealizing the monarch as a deus ex machina. …”
    Get full text
    Article
  10. 190

    Sword of Heaven : Political Theology in Measure for Measure by Richard Wilson

    Published 2001-01-01
    “…Yet, textual research has established Measure for Measure beyond question as a ‘posthumous collaboration’, and ensured we can never go back to the sovereign Shakespeare. It was Middleton’s tampering with Shakespeare’s text that transformed it from a drama of demonic substitution, focused on the ‘outward-sainted deputy’ [3.1.93] into an allegory of divine sovereignty, idealizing the monarch as a deus ex machina. …”
    Get full text
    Article
  11. 191

    Eliminating the Effect of Rating Bias on Reputation Systems by Leilei Wu, Zhuoming Ren, Xiao-Long Ren, Jianlin Zhang, Linyuan Lü

    Published 2018-01-01
    “…However, many empirical cases demonstrate that consumers may be misled by rating scores added by unreliable users or deliberate tampering. In this case, users’ reputation, that is, the ability to rate trustily and precisely, makes a big difference during the evaluation process. …”
    Get full text
    Article
  12. 192

    Identification of Accounting Fraud Based on Support Vector Machine and Logistic Regression Model by Rongyuan Qin

    Published 2021-01-01
    “…Accounting fraud is the tampering and distortion of the company’s public disclosure information. …”
    Get full text
    Article
  13. 193

    Blockchain-Based Secure Traceable Scheme for Food Supply Chain by S. Thangamayan, Kalyani Pradhan, Ganesh Babu Loganathan, S. Sitender, S. Sivamani, Mulugeta Tesema

    Published 2023-01-01
    “…It was also employed in the blockchain system, in addition to its features of decentralization, tamper-proof, and traceability. To implement the data update service and the food recall function, introduce the Food and Drug Administration node. …”
    Get full text
    Article
  14. 194

    Convergence of Blockchain, IoT, and AI for Enhanced Traceability Systems: A Comprehensive Review by Yahaya Saidu, Shuhaida Mohamed Shuhidan, Dahiru Adamu Aliyu, Izzatdin Abdul Aziz, Shamsuddeen Adamu

    Published 2025-01-01
    “…Key trends include AI-driven analytics, real-time IoT data collection, and the need for secure, tamper-proof data by BC. However, interoperability, scalability, and standardization challenges hinder adoption. …”
    Get full text
    Article
  15. 195

    Detection of Manipulations in Digital Images: A Review of Passive and Active Methods Utilizing Deep Learning by Paweł Duszejko, Tomasz Walczyna, Zbigniew Piotrowski

    Published 2025-01-01
    “…This study reviews the scientific literature and research findings, focusing on techniques that detect image manipulations and localize areas of tampering, utilizing both statistical properties of images and embedded hidden watermarks. …”
    Get full text
    Article
  16. 196

    The Impact of Digitization on Legal Systems in Developing Countries by Ikhtiyor Djuraev, Azim Baratov, Shokhjakhon Khujayev, Iroda Yakubova, Mokhichekhra Rakhmonova, Bobur Mukumov, Nodirakhon Abdurakhmanova

    Published 2025-01-01
    “…The study identifies blockchain as a critical tool for ensuring the integrity and security of legal records, providing tamper-proof documentation, and fostering trust in legal processes. …”
    Get full text
    Article
  17. 197

    Blockchain enabled traceability in the jewel supply chain by Aman Patel, Siva Sai, Ankit Daiya, Harshal Akolekar, Vinay Chamola

    Published 2025-01-01
    “…Blockchain operates as a secure, immutable ledger, ensuring data integrity and transparency while preventing fraud and tampering due to its decentralized nature. Ethereum’s key features, including nodes, addresses, and smart contracts, make it an ideal platform for this application. …”
    Get full text
    Article
  18. 198

    False data injection attack sample generation using an adversarial attention-diffusion model in smart grids by Kunzhan Li, Fengyong Li, Baonan Wang, Meijing Shan

    Published 2024-12-01
    “…A false data injection attack (FDIA) indicates that attackers mislead system decisions by inputting false or tampered data into the system, which seriously threatens the security of power cyber-physical systems. …”
    Get full text
    Article
  19. 199

    Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks by Mei Sun, Yuyan Guo, Dongbing Zhang, MingMing Jiang

    Published 2021-01-01
    “…Many existing schemes suffer from high computational cost by using bilinear pairing operation or need the assistance of the trust authorities (TAs) during the authentication process or rely on an ideal tamper-proof device (TPD), which requires very strong security assumption. …”
    Get full text
    Article
  20. 200

    A Scalable Blockchain Framework for ELA Assessment by Chunxia Tian

    Published 2022-01-01
    “…Blockchain technology is decentralized, tamper-proof, traceable, trackable, open and transparent, which is conducive to the realization of individual student-centered teaching and learning, as well as an open, and transparent teaching process, which can motivate the learning motivation of English majors and improve the effectiveness of the student management and training models. …”
    Get full text
    Article