-
1Academic Journal
المصدر: Tehnički Vjesnik, Vol 31, Iss 4, Pp 1223-1231 (2024)
مصطلحات موضوعية: chaotic mapping, corpus, corpus retrieval, perceived hash algorithm, tamper resistance, Engineering (General). Civil engineering (General), TA1-2040
وصف الملف: electronic resource
-
2Academic Journal
المصدر: Tehnički vjesnik ; ISSN 1330-3651 (Print) ; ISSN 1848-6339 (Online) ; Volume 31 ; Issue 4
مصطلحات موضوعية: chaotic mapping, corpus, corpus retrieval, perceived hash algorithm, tamper resistance
وصف الملف: application/pdf
Relation: https://hrcak.srce.hr/318482
-
3Academic Journal
المؤلفون: Masaya Yoshikawa, Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, 吉川 雅弥, 池崎 良哉, 竹本 修, 野崎 佑典
المصدر: 電気学会論文誌C(電子・情報・システム部門誌) / IEEJ Transactions on Electronics, Information and Systems. 2024, 144(1):7
-
4Academic Journal
المؤلفون: Aitizaz Ali, Bander Ali Saleh Al-rimy, Abdulwahab Ali Almazroi, Faisal S. Alsubaei, Abdulaleem Ali Almazroi, Faisal Saeed
المصدر: Sensors; Volume 23; Issue 16; Pages: 7162
مصطلحات موضوعية: privacy preservation, cyber-physical systems, consortium blockchain, trust, tamper-resistance
وصف الملف: application/pdf
Relation: Sensor Networks; https://dx.doi.org/10.3390/s23167162
الاتاحة: https://doi.org/10.3390/s23167162
-
5Academic Journal
المؤلفون: Austin, Thomas H., Di Troia, Fabio
المصدر: Faculty Research, Scholarly, and Creative Activity
مصطلحات موضوعية: Blockchain, Logging, Tamper-resistance, Computer Science
وصف الملف: application/pdf
Relation: https://scholarworks.sjsu.edu/faculty_rsca/3257; https://scholarworks.sjsu.edu/context/faculty_rsca/article/4256/viewcontent/A_20Blockchain_Based_20Tamper_Resistant_20Logging_20Framework.pdf
-
6Academic Journal
المؤلفون: Bertrand Francis Cambou, Saloni Jain
المصدر: Applied Sciences, Vol 12, Iss 1785, p 1785 (2022)
مصطلحات موضوعية: key recovery, content protection, cybersecurity, unclonable devices, network of IoT, tamper resistance, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Relation: https://www.mdpi.com/2076-3417/12/4/1785; https://doaj.org/toc/2076-3417; https://doaj.org/article/6f352db5be1046fe9339ef01bf966889
-
7
المؤلفون: Guowen Xu, Yinghui Zhang, Jianting Ning, Yingjiu Li, Shengmin Xu, Robert H. Deng, Xinyi Huang
المصدر: IEEE Transactions on Dependable and Secure Computing. 20:53-67
مصطلحات موضوعية: Scheme (programming language), Security analysis, business.industry, Computer science, Access control, Cloud computing, Computer security model, Encryption, Computer security, computer.software_genre, Cryptosystem, Electrical and Electronic Engineering, business, computer, Tamper resistance, computer.programming_language
-
8Academic Journal
المصدر: Faust , S , Mukherjee , P , Nielsen , J B & Venturi , D 2020 , ' Continuously Non-malleable Codes in the Split-State Model ' , Journal of Cryptology , vol. 33 , no. 4 , pp. 2034-2077 . https://doi.org/10.1007/s00145-020-09362-z
مصطلحات موضوعية: Non-malleable codes, Split-state model, Tamper resistance
وصف الملف: application/pdf
الاتاحة: https://pure.au.dk/portal/da/publications/continuously-nonmalleable-codes-in-the-splitstate-model(fc006f0f-1775-488a-b73a-20416f1feafd).html
https://doi.org/10.1007/s00145-020-09362-z
https://pure.au.dk/ws/files/224578363/Faust2020_Article_ContinuouslyNon_malleableCodes.pdf
http://www.scopus.com/inward/record.url?scp=85089013348&partnerID=8YFLogxK -
9
المصدر: IEEE Embedded Systems Letters. 14:103-106
مصطلحات موضوعية: General Computer Science, Control and Systems Engineering, business.industry, Computer science, Embedded system, business, Tamper resistance, Superparamagnetism
-
10Research on a Covert Communication Model Realized by Using Smart Contracts in Blockchain Environment
المؤلفون: Huiling Chen, Weizheng Wang, Yansen Su, Zhang Zhijie, Zilong Jin, Lejun Zhang
المصدر: IEEE Systems Journal. 16:2822-2833
مصطلحات موضوعية: Information privacy, 021103 operations research, Blockchain, Smart contract, Computer Networks and Communications, Computer science, business.industry, Node (networking), 0211 other engineering and technologies, 02 engineering and technology, Bidding, Computer security, computer.software_genre, Encryption, Computer Science Applications, Control and Systems Engineering, Data redundancy, Electrical and Electronic Engineering, business, computer, Tamper resistance, Information Systems
-
11Academic Journal
المؤلفون: S. A. Kruglyak
المصدر: Теория и практика судебной экспертизы, Vol 0, Iss 3(43), Pp 59-63 (2016)
مصطلحات موضوعية: locks, security seals, tamper resistance of security seals, Social pathology. Social and public welfare. Criminology, HV1-9960
وصف الملف: electronic resource
-
12Academic Journal
المؤلفون: Jun Shiomi, 塩見 準
المصدر: JSAP Annual Meetings Extended Abstracts. 2021, :60
-
13Academic Journal
المؤلفون: Cui, Xi
المصدر: International Journal of Communication; Vol 13 (2019); 14 ; 1932-8036
مصطلحات موضوعية: mediatized ritual, deep mediatization, networked access, tamper-resistance, blockchain
وصف الملف: application/pdf
-
14Academic Journal
المؤلفون: Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 1 (2018)
مصطلحات موضوعية: Tamper-resistance, Physical Unclonable Function (PUF), Secure Bootstrap, Security Standards, FIPS 140-2, Higher-Order Alphabet PUF (HOA PUF), Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
15
المؤلفون: Rui Zhu, Tong Li, Fengsen Gao, Qiang Xiao, Jishu Wang, Qiang Wang
المصدر: IEEE Transactions on Vehicular Technology. 70:11324-11337
مصطلحات موضوعية: Blockchain, Computer Networks and Communications, Computer science, Aerospace Engineering, Data security, Evasion (network security), Computer security, computer.software_genre, Automotive Engineering, Data Protection Act 1998, Electronic toll collection, Electrical and Electronic Engineering, Intelligent transportation system, Transaction data, computer, Tamper resistance
-
16
المؤلفون: Hongwei Sun, Xiaogang Xing, Yuling Chen, Yang Xin, Tao Li
المصدر: Journal of Cloud Computing: Advances, Systems and Applications, Vol 10, Iss 1, Pp 1-11 (2021)
مصطلحات موضوعية: Subchain, Computer engineering. Computer hardware, Theoretical computer science, Computer Networks and Communications, business.industry, Computer science, Hash function, Cloud computing, QA75.5-76.95, TK7885-7895, Tree traversal, Blockchain, Hash pointer, Pointer (computer programming), Electronic computers. Computer science, Path (graph theory), Query optimization, business, Database transaction, Software, Tamper resistance, Block (data storage)
-
17
المؤلفون: Naveen John, I. Shatheesh Sam
المصدر: International Journal on Semantic Web and Information Systems. 17:76-98
مصطلحات موضوعية: Password, Computer Networks and Communications, Computer science, business.industry, Cloud computing, Computer security, computer.software_genre, Data sharing, Data access, Key (cryptography), Session (computer science), business, computer, Cloud storage, Tamper resistance, Information Systems
-
18Academic Journal
المؤلفون: Immler, Vincent, Obermaier, Johannes, Ng, Kuan Kuan, Ke, Fei Xiang, Lee, JinYu, Lim, Yak Peng, Oh, Wei Koon, Wee, Keng Hoong, Sigl, Georg
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2019, Issue 1; 51-96 ; 2569-2925
مصطلحات موضوعية: Tamper-resistance, Physical Unclonable Function (PUF), Secure Bootstrap, Security Standards, FIPS 140-2, Higher-Order Alphabet PUF (HOA PUF)
وصف الملف: application/pdf
-
19Academic Journal
المؤلفون: Masaya Yoshikawa, Shu Takemoto, Yusuke Nozaki, 吉川 雅弥, 竹本 修, 野崎 佑典
المصدر: 電気学会論文誌C(電子・情報・システム部門誌) / IEEJ Transactions on Electronics, Information and Systems. 2019, 139(12):1380
-
20Academic JournalImplementation of Obfuscated Control Logic Circuit with LegUp and oLLVM / LegUpとoLLVMによる難読化制御論理回路の実装
المؤلفون: Naoki Fujieda, Shotaro Yamada, Shuichi Ichikawa, 山田 翔太郎, 市川 周一, 藤枝 直輝
المصدر: 電気学会論文誌C(電子・情報・システム部門誌) / IEEJ Transactions on Electronics, Information and Systems. 2019, 139(9):952