Results 281 to 290 of about 36,777 (311)
Some of the next articles are maybe not open access.
Existential Forgery Attack Against One Strong Signature Scheme
2011The GMY signature is based on the intractability of factorization. In the scheme, messages will be signed in a bit-by-bit fashion. It claims that an adversary cannot forge a new signature, even after seeing a large number of genuine signed messages. In this chapter, we present an existential forgery attack against it. It shows the adversary succeeds in
Zhengjun Cao, Qian Sha
openaire +1 more source
Chosen-message forgery attack on SCREAM
International Conference on Network Communication and Information Security (ICNIS 2021), 2022Lipeng Chang +4 more
openaire +1 more source
Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015Website Forgery is a type of web based attack where the phisher builds a website that is completely independent or a replica of a legitimate website, with the goal of deceiving a user by extracting information that could be used to defraud or launch other attacks upon the victim.
openaire +1 more source
PRRNet: Pixel-Region relation network for face forgery detection
Pattern Recognition, 2021, Lingyun Yu, Yong-Dong Zhang
exaly
Two-Stage Copy-Move Forgery Detection With Self Deep Matching and Proposal SuperGlue
IEEE Transactions on Image Processing, 2022Yaqi Liu, Chao Xia, Xiaobin Zhu
exaly
Segmentation-Based Image Copy-Move Forgery Detection Scheme
IEEE Transactions on Information Forensics and Security, 2015Xiaolong Li, Xingming Sun
exaly

