Results 161 to 170 of about 36,777 (311)
A Quantum Proxy Signature Scheme Without Restrictions on the Identity and Number of Verifiers. [PDF]
Xiong S.
europepmc +1 more source
ABSTRACT Civically and politically participating children and teens encounter contrasting societal beliefs about their identities and actions. Some portray them as heroes, others as naive or rebellious; some celebrate their efforts, while others dismiss or diminish them.
Markéta Supa +3 more
wiley +1 more source
Omega deoxyribonucleic acid cryptography key-based authentication. [PDF]
Chuah CW, Tey J, Mohamad KM.
europepmc +1 more source
A Study On Cross-Site Request Forgery Attack And Its Prevention Measures
Puneet Kour
openalex +1 more source
Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore [PDF]
Mohamed Sabt, Jacques Traoré
openalex +1 more source
Universal Anti-forensics Attack against Image Forgery Detection via Multi-modal Guidance [PDF]
Haipeng Li +5 more
openalex +2 more sources
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards [PDF]
Chin‐Chen Chang, Kuo‐Feng Hwang
openalex +1 more source
Robust audio authenticity detection based on One-Class learning
Deepfake technology poses a serious threat to social economy, political stability, and social security. Among them, voice forgery technology is widely used in harmful activities such as phone scams and public opinion manipulation.
LIANG Ziqi +3 more
doaj
Robust deepfake detector against deep image watermarking. [PDF]
Yu J, Liu X, Zan F, Peng Y.
europepmc +1 more source

