Results 11 to 20 of about 387,319 (288)

Novel Designated Ownership Transfer with Grouping Proof

open access: yesApplied Sciences, 2019
In the supply chain management literature, various mobile radio frequency identification (RFID) protocols have been proposed for minimizing cargo theft during transport while ensuring the integrity of the entire cargo load or transferring ownership of a ...
Kuo-Yu Tsai   +3 more
doaj   +3 more sources

Beyond the bubble: Will NFTs and digital proof of ownership empower creative industry entrepreneurs? [PDF]

open access: yesJournal of Business Venturing Insights, 2022
Non-fungible Tokens (NFTs) are blockchain-enabled cryptographic assets that represent proof-of-ownership for digital objects. The use of NFTs has been pioneered by creative industry entrepreneurs who have sought to generate new revenue streams and modes of stakeholder engagement.
Chalmers, Dominic   +4 more
openaire   +6 more sources

An efficient confidentiality-preserving Proof of Ownership for deduplication

open access: yesJournal of Network and Computer Applications, 2015
Data storage in the cloud is becoming widespread. Deduplication is a key mechanism to decrease the operating costs cloud providers face, due to the reduction of replicated data storage. Nonetheless, deduplication must deal with several security threats such as honest-but-curious servers or malicious users who may try to take ownership of files they are
Lorena González-Manzano, Agustin Orfila
openaire   +4 more sources

A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain

open access: yesIEEE Access, 2017
For more than a decade now, radio frequency identification (RFID) technology has been quite effective in providing anti-counterfeits measures in the supply chain.
Kentaroh Toyoda   +3 more
doaj   +3 more sources

Efficient proof of ownership for cloud storage systems [PDF]

open access: yesAIP Conference Proceedings, 2017
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file.
Weiwei Zhong, Zhusong Liu
openaire   +1 more source

Boosting efficiency and security in proof of ownership for deduplication [PDF]

open access: yesProceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012
Deduplication is a technique used to reduce the amount of storage needed by service providers. It is based on the intuition that several users may want (for different reasons) to store the same content. Hence, storing a single copy of these files is sufficient.
DI PIETRO, ROBERTO, Sorniotti A.
openaire   +2 more sources

Proof of Luck: an Efficient Blockchain Consensus Protocol [PDF]

open access: yes, 2017
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs.
Castro M.   +4 more
core   +2 more sources

Proof of cipher text ownership based on convergence encryption [PDF]

open access: yesAIP Conference Proceedings, 2017
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements
Weiwei Zhong, Zhusong Liu
openaire   +1 more source

An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj   +1 more source

Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders

open access: yesJournal of Information Security and Applications, 2023
Marca de agua modelo La marca de agua modelo es un método para incrustar información de marca de agua en un modelo de red neuronal. Demuestra la propiedad del modelo sin afectar a su rendimiento. Dado que hay muchos ataques contra la poda de modelos, es más importante diseñar algoritmos de marcas de agua de modelos contra la poda. En este documento, se
Li Li   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy