Journal articles on the topic 'Tampering functions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 30 journal articles for your research on the topic 'Tampering functions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Babar, Prof Madhuri, Sanket Meshram, Dhanashri Gulhane, Jagdish Kore, Harshad Nikhare, and Aditi Salodkar. "ANTI-THEFT ALERT SYSTEM FOR SMART VEHICLES USING MOBILE APP." International Journal of Engineering Applied Sciences and Technology 6, no. 6 (October 1, 2021): 330–35. http://dx.doi.org/10.33564/ijeast.2021.v06i06.048.
Full textDoegar, Amit, Srinidhi Hiriyannaiah, G. M. Siddesh, K. G. Srinivasa, and Maitreyee Dutta. "Cloud-Based Fusion of Residual Exploitation-Based Convolutional Neural Network Models for Image Tampering Detection in Bioinformatics." BioMed Research International 2021 (April 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/5546572.
Full textBashir, Iram, Fawad Ahmed, Jawad Ahmad, Wadii Boulila, and Nouf Alharbi. "A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids." Entropy 21, no. 11 (November 19, 2019): 1132. http://dx.doi.org/10.3390/e21111132.
Full textAlkatheiri, Mohammed Saeed, Sajid Saleem, Mohammed Ali Alqarni, Ahmad O. Aseeri, Sajjad Hussain Chauhdary, and Yu Zhuang. "A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions." Electronics 11, no. 18 (September 15, 2022): 2921. http://dx.doi.org/10.3390/electronics11182921.
Full textPan, Jiateng, Atsushi Yoshikawa, and Masayuki Yamamura. "A New Model for Bias-Generating Agent-Based Simulation and Its Application to Election Systems: Allowing Agents to Make Mistakes for a Reason." Mathematical Problems in Engineering 2022 (April 13, 2022): 1–12. http://dx.doi.org/10.1155/2022/4010945.
Full textKarim Daragmeh, Abdel. "Tampering with the absurd genre: the translation of Waiting for Godot as an example." Onomázein Revista de lingüística filología y traducción, no. 56 (2022): 167–83. http://dx.doi.org/10.7764/onomazein.56.09.
Full textFaust, Sebastian, Pratyay Mukherjee, Jesper Buus Nielsen, and Daniele Venturi. "Continuously Non-malleable Codes in the Split-State Model." Journal of Cryptology 33, no. 4 (July 24, 2020): 2034–77. http://dx.doi.org/10.1007/s00145-020-09362-z.
Full textMuhammad Nur, Teguh, Wasis Waskito, Azhar Fathoni, Bagas, Yuda, Ramadan Galih, Alif Ainnun Qoyum, and Samsoni. "The Effectiveness of the Port Knocking Method in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 873–80. http://dx.doi.org/10.55927/ijis.v2i6.4526.
Full textPaul, Shubhra Deb, and Swarup Bhunia. "SILVerIn: Systematic Integrity Verification of Printed Circuit Board Using JTAG Infrastructure." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–28. http://dx.doi.org/10.1145/3460232.
Full textSepúlveda, Johanna, Felix Wilgerodt, and Michael Pehl. "Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions." it - Information Technology 61, no. 1 (February 25, 2019): 29–43. http://dx.doi.org/10.1515/itit-2018-0030.
Full textFang, Shengbang, Ronnie A. Sebro, and Matthew C. Stamm. "A Deep Learning Approach to MRI Scanner Manufacturer and Model Identification." Electronic Imaging 2020, no. 4 (January 26, 2020): 217–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.4.mwsf-217.
Full textRaut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.
Full textKang, Yang, Qiang Li, and Yuanyong Liu. "Trusted Data Analysis and Consensus Mechanism of Product Traceability Based on Blockchain." Computational Intelligence and Neuroscience 2022 (August 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/3035231.
Full textSun, Haonan, Rongyu He, Yong Zhang, Ruiyun Wang, Wai Hung Ip, and Kai Leung Yung. "eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology." Sensors 18, no. 11 (November 6, 2018): 3807. http://dx.doi.org/10.3390/s18113807.
Full textHassan Rahmah Zagi and Abeer Tariq Maolood. "A NOVEL SERPENT ALGORITHM IMPROVEMENT BY THE KEY SCHEDULE INCREASE SECURITY." Tikrit Journal of Pure Science 25, no. 6 (December 24, 2020): 114–25. http://dx.doi.org/10.25130/tjps.v25i6.320.
Full textArsyad, Andi Arniaty, Irawan Widi Widayat, and Mario Köppen. "Supporting farming smart documentation system by modular blockchain solutions." Decision Making: Applications in Management and Engineering 5, no. 1 (March 15, 2022): 1–26. http://dx.doi.org/10.31181/dmame0326022022a.
Full textLeont’ev, V. V., and M. A. Borodin. "Tapering the Incident Field When Solving Problems of Electromagnetic Wave Scattering Over Finite-Size Random Surfaces." Journal of the Russian Universities. Radioelectronics 24, no. 4 (September 28, 2021): 48–56. http://dx.doi.org/10.32603/1993-8985-2021-24-4-48-56.
Full textDai, Xinlong, Qin Li, Xuzheng Li, Zhengmao Yan, and Xiaobo Jiang. "Design and Implementation of Traceability System Based on Blockchain." Frontiers in Business, Economics and Management 7, no. 1 (December 20, 2022): 53–60. http://dx.doi.org/10.54097/fbem.v7i1.3737.
Full textDe Silvestri, Sara, Mirco Pagliarani, Filippo Tomasello, Diana Trojaniello, and Alberto Sanna. "Design of a Service for Hospital Internal Transport of Urgent Pharmaceuticals via Drones." Drones 6, no. 3 (March 8, 2022): 70. http://dx.doi.org/10.3390/drones6030070.
Full textRadan, Alireza, Hoseine Samimi, and Ali Moeni. "A new lightweight authentication protocol in IoT environment for RFID tags." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 344. http://dx.doi.org/10.14419/ijet.v7i4.7.23028.
Full textK, Divyaa S., Kiruthika K, Shahin Ashra S, Sindhuja J, and Bhavani N. "FIR Security System Using Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (June 30, 2023): 3029–33. http://dx.doi.org/10.22214/ijraset.2023.52548.
Full textSlezin, Anatoly A. "Pioneer “Light Horsemen”." Herald of an archivist, no. 2 (2019): 519–29. http://dx.doi.org/10.28995/2073-0101-2019-2-519-529.
Full textYao, Zhengyi, Liang Tan, and Kun She. "5G-BSS: 5G-Based Universal Blockchain Smart Sensors." Sensors 22, no. 12 (June 18, 2022): 4607. http://dx.doi.org/10.3390/s22124607.
Full textChangalvala, Raghu, Brandon Fedoruk, and Hafiz Malik. "Radar Data Integrity Verification Using 2D QIM-Based Data Hiding." Sensors 20, no. 19 (September 27, 2020): 5530. http://dx.doi.org/10.3390/s20195530.
Full textWilson, Taylor, and Bertrand Cambou. "Tamper-sensitive pre-formed ReRAM-based PUFs: Methods and experimental validation." Frontiers in Nanotechnology 4 (November 3, 2022). http://dx.doi.org/10.3389/fnano.2022.1055545.
Full textYu, Jian, Fang Xu, and Youfeng Li. "Research and design of student archives management system based on consortium blockchain." Journal of Computational Methods in Sciences and Engineering, May 29, 2023, 1–10. http://dx.doi.org/10.3233/jcm-226825.
Full textGong, Terence, Xingyu Tao, Moumita Das, Yuhan Liua, and Jack Chenga. "Blockchain-based E-tendering Evaluation Framework." International Journal of Automation & Digital Transformation 1, no. 1 (April 18, 2022). http://dx.doi.org/10.54878/ijadt.131.
Full textGebali, Fayez, and Mohammad Mamun. "Review of Physically Unclonable Functions (PUFs): Structures, Models, and Algorithms." Frontiers in Sensors 2 (January 11, 2022). http://dx.doi.org/10.3389/fsens.2021.751748.
Full textOprea, Simona-Vasilica, and Adela Bâra. "Feature engineering solution with structured query language analytic functions in detecting electricity frauds using machine learning." Scientific Reports 12, no. 1 (February 28, 2022). http://dx.doi.org/10.1038/s41598-022-07337-7.
Full textNirale, Prabhuti, Shivani Arora, Anita Solanki, Jnanadeva Bhat, Rishi Kumar Singh, and Khushwant S. Yadav. "Liquid filled hard shell capsules: Current drug delivery influencing pharmaceutical technology." Current Drug Delivery 18 (March 1, 2021). http://dx.doi.org/10.2174/1567201818666210301094400.
Full text