Results 281 to 290 of about 36,777 (311)
Some of the next articles are maybe not open access.

Existential Forgery Attack Against One Strong Signature Scheme

2011
The GMY signature is based on the intractability of factorization. In the scheme, messages will be signed in a bit-by-bit fashion. It claims that an adversary cannot forge a new signature, even after seeing a large number of genuine signed messages. In this chapter, we present an existential forgery attack against it. It shows the adversary succeeds in
Zhengjun Cao, Qian Sha
openaire   +1 more source

Chosen-message forgery attack on SCREAM

International Conference on Network Communication and Information Security (ICNIS 2021), 2022
Lipeng Chang   +4 more
openaire   +1 more source

Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures

2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Website Forgery is a type of web based attack where the phisher builds a website that is completely independent or a replica of a legitimate website, with the goal of deceiving a user by extracting information that could be used to defraud or launch other attacks upon the victim.
openaire   +1 more source

Art attack: spot the forgery

Engineering & Technology, 2021
openaire   +1 more source

PRRNet: Pixel-Region relation network for face forgery detection

Pattern Recognition, 2021
, Lingyun Yu, Yong-Dong Zhang
exaly  

Two-Stage Copy-Move Forgery Detection With Self Deep Matching and Proposal SuperGlue

IEEE Transactions on Image Processing, 2022
Yaqi Liu, Chao Xia, Xiaobin Zhu
exaly  

Image forgery techniques: a review

Artificial Intelligence Review, 2022
Munish Kumar
exaly  

Segmentation-Based Image Copy-Move Forgery Detection Scheme

IEEE Transactions on Information Forensics and Security, 2015
Xiaolong Li, Xingming Sun
exaly  

The Archaeoraptor forgery

Nature, 2001
Richard A Ketcham   +2 more
exaly  

Home - About - Disclaimer - Privacy