Results 11 to 20 of about 387,319 (288)
Novel Designated Ownership Transfer with Grouping Proof
In the supply chain management literature, various mobile radio frequency identification (RFID) protocols have been proposed for minimizing cargo theft during transport while ensuring the integrity of the entire cargo load or transferring ownership of a ...
Kuo-Yu Tsai +3 more
doaj +3 more sources
Beyond the bubble: Will NFTs and digital proof of ownership empower creative industry entrepreneurs? [PDF]
Non-fungible Tokens (NFTs) are blockchain-enabled cryptographic assets that represent proof-of-ownership for digital objects. The use of NFTs has been pioneered by creative industry entrepreneurs who have sought to generate new revenue streams and modes of stakeholder engagement.
Chalmers, Dominic +4 more
openaire +6 more sources
An efficient confidentiality-preserving Proof of Ownership for deduplication
Data storage in the cloud is becoming widespread. Deduplication is a key mechanism to decrease the operating costs cloud providers face, due to the reduction of replicated data storage. Nonetheless, deduplication must deal with several security threats such as honest-but-curious servers or malicious users who may try to take ownership of files they are
Lorena González-Manzano, Agustin Orfila
openaire +4 more sources
For more than a decade now, radio frequency identification (RFID) technology has been quite effective in providing anti-counterfeits measures in the supply chain.
Kentaroh Toyoda +3 more
doaj +3 more sources
Efficient proof of ownership for cloud storage systems [PDF]
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file.
Weiwei Zhong, Zhusong Liu
openaire +1 more source
Boosting efficiency and security in proof of ownership for deduplication [PDF]
Deduplication is a technique used to reduce the amount of storage needed by service providers. It is based on the intuition that several users may want (for different reasons) to store the same content. Hence, storing a single copy of these files is sufficient.
DI PIETRO, ROBERTO, Sorniotti A.
openaire +2 more sources
Proof of Luck: an Efficient Blockchain Consensus Protocol [PDF]
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs.
Castro M. +4 more
core +2 more sources
Proof of cipher text ownership based on convergence encryption [PDF]
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements
Weiwei Zhong, Zhusong Liu
openaire +1 more source
An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj +1 more source
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders
Marca de agua modelo La marca de agua modelo es un método para incrustar información de marca de agua en un modelo de red neuronal. Demuestra la propiedad del modelo sin afectar a su rendimiento. Dado que hay muchos ataques contra la poda de modelos, es más importante diseñar algoritmos de marcas de agua de modelos contra la poda. En este documento, se
Li Li +5 more
openaire +1 more source

