-
181
Abuse potential of fentanyl and fentanyl analogues
Published 2024-11-01“…Conclusions: By educating patients and physicians, making rescue kits easily accessible, developing vaccines to prevent opioid addiction, and perhaps even creating new tamper-resistant fentanyl formulations, it may be possible to prevent fentanyl misuse, therapeutic errors, and the repercussions that follow.…”
Get full text
Article -
182
A Secure Framework for Privacy-Preserving Analytics in Healthcare Records Using Zero-Knowledge Proofs and Blockchain in Multi-Tenant Cloud Environments
Published 2025-01-01“…These proofs, integrated into a blockchain network, create a tamper-proof, transparent ledger that ensures secure healthcare transactions. …”
Get full text
Article -
183
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01“…The algorithm in this paper is applied to network transmission, which can effectively prevent data eavesdropping, tampering and forgery, ensure communication security.…”
Get full text
Article -
184
Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network
Published 2015-01-01“…In an ETC system, toll transaction data are transmitted over intelligent transportation networks, which is vulnerable to eavesdropping, interfering, and tampering attacks. To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
Get full text
Article -
185
Revealing Traces of Image Resampling and Resampling Antiforensics
Published 2017-01-01“…The forensics of resampling plays an important role in image tampering detection, steganography, and steganalysis. …”
Get full text
Article -
186
Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations
Published 2019-11-01“…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
Get full text
Article -
187
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01“…Our current research provides a new algorithm for a publicly-keyed encryption system to keep bank data from tampering and theft when stored on the cloud computing platform, and our new system achieves fully Homomorphic Encryption, which allows mathematical operations to be performed on the encrypted text without the need for the original text. …”
Get full text
Article -
188
RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT
Published 2025-01-01“…Traditional centralized IoT architectures often face issues such as single points of failure and insufficient reliability, while blockchain, with its decentralized and tamper-resistant properties, offers a promising solution. …”
Get full text
Article -
189
Sword of heaven
Published 2019-12-01“…Yet, textual research has established Measure for Measure beyond question as a ‘posthumous collaboration’, and ensured we can never go back to the sovereign Shakespeare. It was Middleton’s tampering with Shakespeare’s text that transformed it from a drama of demonic substitution, focused on the ‘outward-sainted deputy’ [3.1.93] into an allegory of divine sovereignty, idealizing the monarch as a deus ex machina. …”
Get full text
Article -
190
Sword of Heaven : Political Theology in Measure for Measure
Published 2001-01-01“…Yet, textual research has established Measure for Measure beyond question as a ‘posthumous collaboration’, and ensured we can never go back to the sovereign Shakespeare. It was Middleton’s tampering with Shakespeare’s text that transformed it from a drama of demonic substitution, focused on the ‘outward-sainted deputy’ [3.1.93] into an allegory of divine sovereignty, idealizing the monarch as a deus ex machina. …”
Get full text
Article -
191
Eliminating the Effect of Rating Bias on Reputation Systems
Published 2018-01-01“…However, many empirical cases demonstrate that consumers may be misled by rating scores added by unreliable users or deliberate tampering. In this case, users’ reputation, that is, the ability to rate trustily and precisely, makes a big difference during the evaluation process. …”
Get full text
Article -
192
Identification of Accounting Fraud Based on Support Vector Machine and Logistic Regression Model
Published 2021-01-01“…Accounting fraud is the tampering and distortion of the company’s public disclosure information. …”
Get full text
Article -
193
Blockchain-Based Secure Traceable Scheme for Food Supply Chain
Published 2023-01-01“…It was also employed in the blockchain system, in addition to its features of decentralization, tamper-proof, and traceability. To implement the data update service and the food recall function, introduce the Food and Drug Administration node. …”
Get full text
Article -
194
Convergence of Blockchain, IoT, and AI for Enhanced Traceability Systems: A Comprehensive Review
Published 2025-01-01“…Key trends include AI-driven analytics, real-time IoT data collection, and the need for secure, tamper-proof data by BC. However, interoperability, scalability, and standardization challenges hinder adoption. …”
Get full text
Article -
195
Detection of Manipulations in Digital Images: A Review of Passive and Active Methods Utilizing Deep Learning
Published 2025-01-01“…This study reviews the scientific literature and research findings, focusing on techniques that detect image manipulations and localize areas of tampering, utilizing both statistical properties of images and embedded hidden watermarks. …”
Get full text
Article -
196
The Impact of Digitization on Legal Systems in Developing Countries
Published 2025-01-01“…The study identifies blockchain as a critical tool for ensuring the integrity and security of legal records, providing tamper-proof documentation, and fostering trust in legal processes. …”
Get full text
Article -
197
Blockchain enabled traceability in the jewel supply chain
Published 2025-01-01“…Blockchain operates as a secure, immutable ledger, ensuring data integrity and transparency while preventing fraud and tampering due to its decentralized nature. Ethereum’s key features, including nodes, addresses, and smart contracts, make it an ideal platform for this application. …”
Get full text
Article -
198
False data injection attack sample generation using an adversarial attention-diffusion model in smart grids
Published 2024-12-01“…A false data injection attack (FDIA) indicates that attackers mislead system decisions by inputting false or tampered data into the system, which seriously threatens the security of power cyber-physical systems. …”
Get full text
Article -
199
Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks
Published 2021-01-01“…Many existing schemes suffer from high computational cost by using bilinear pairing operation or need the assistance of the trust authorities (TAs) during the authentication process or rely on an ideal tamper-proof device (TPD), which requires very strong security assumption. …”
Get full text
Article -
200
A Scalable Blockchain Framework for ELA Assessment
Published 2022-01-01“…Blockchain technology is decentralized, tamper-proof, traceable, trackable, open and transparent, which is conducive to the realization of individual student-centered teaching and learning, as well as an open, and transparent teaching process, which can motivate the learning motivation of English majors and improve the effectiveness of the student management and training models. …”
Get full text
Article