Results 51 to 60 of about 36,777 (311)
Forgery-Resistant Touch-based Authentication on Mobile Devices
Mobile devices store a diverse set of private user data and have gradually become a hub to control users' other personal Internet-of-Things devices. Access control on mobile devices is therefore highly important.
Frank, Mario +3 more
core +1 more source
Recent Advances on Thermochromic Inks for Security Applications
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira +5 more
wiley +1 more source
With the wide use of online social networks (OSNs), the problem of data privacy has attracted a lot of attention from not only the research community but also the general public.
Guanglai Guo +4 more
doaj +1 more source
Self-supervised Multi-Modal Video Forgery Attack Detection
Video forgery attack threatens the surveillance system by replacing the video captures with unrealistic synthesis, which can be powered by the latest augment reality and virtual reality technologies. From the machine perception aspect, visual objects often have RF signatures that are naturally synchronized with them during recording.
Zhao, Chenhui, Li, Xiang, Younes, Rabih
openaire +2 more sources
This review explores recent advances in digital micromirror device (DMD)‐based lithography, focusing on its programmable light modulation, multi‐material compatibility, and dimensional patterning strategies. It highlights innovations from optical system design to materials integration and multifunctional applications, positioning DMD lithography as a ...
Yubin Lee +5 more
wiley +1 more source
Experimental Study of DIGIPASS GO3 and the Security of Authentication [PDF]
Based on the analysis of $6$-digit one-time passwords(OTP) generated by DIGIPASS GO3 we were able to reconstruct the synchronisation system of the token, the OTP generating algorithm and the verification protocol in details essential for an attack.
Semaev, Igor
core +1 more source
An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack
We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1].
Barni, Mauro +2 more
core +1 more source
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations [PDF]
Run Wang +5 more
openalex +3 more sources
Advances in Solid‐Phase Processing Techniques: Innovations, Applications, and Future Perspectives
Based on practical manufacturing challenges, this review examines advanced solid‐phase processing techniques that overcome the inherent limitations of conventional melting‐based and traditional solid‐phase manufacturing, enabling the production of higher‐performance components at reduced cost through process innovation and improved supply‐chain ...
Tianhao Wang
wiley +1 more source
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them
Hong, Choong Seon, Pathan, Al-Sakib Khan
core +1 more source

