Results 41 to 50 of about 386,205 (300)
Advances in information technology have made data accessible anytime and anywhere. Currently, data confirmation is a popular area of research. Many current approaches to data confirmation rely on submitting certificates of ownership, embedding digital ...
Lingyun Zhang +4 more
doaj +1 more source
Rente as Proof of Land Ownership
Rente or proof of payment of land taxes is no longer able used as proof of landownership, however there still people who think rente as proof of land ownership. This research is juridical empirical that analyze the position and perception of society that think rente as proof of ownership of the land in Pangkajene Islands Regency.
openaire +2 more sources
Specifying and Verifying Concurrent Algorithms with Histories and Subjectivity [PDF]
We present a lightweight approach to Hoare-style specifications for fine-grained concurrency, based on a notion of time-stamped histories that abstractly capture atomic changes in the program state.
A. Cerone +10 more
core +1 more source
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited [PDF]
Client-side deduplication is a very effective mechanism to reduce both storage and communication cost in cloud storage service. Halevi et al. (CCS ’11) discovered security vulnerability in existing implementation of client-side deduplication and proposed a cryptographic primitive called “proofs of ownership” (PoW) as a countermeasure.
Jia Xu, Jianying Zhou
openaire +1 more source
Image Watermaking With Biometric Data For Copyright Protection
In this paper, we deal with the proof of ownership or legitimate usage of a digital content, such as an image, in order to tackle the illegitimate copy. The proposed scheme based on the combination of the watermark-ing and cancelable biometrics does not ...
Barbier, Morgan +2 more
core +2 more sources
Ownership and control in a competitive industry [PDF]
We study a differentiated product market in which an investor initially owns a controlling stake in one of two competing firms and may acquire a non-controlling or a controlling stake in a competitor, either directly using her own assets, or indirectly ...
A. Grosso +80 more
core +2 more sources
Secure and efficient ownership verification for deduplicated cloud computing systems
Cloud storage services offer a scalable platform to store a large amount of data at a low cost. It attracts a large number of customers to outsource their data to the cloud.
Jay Dave +5 more
doaj +1 more source
Secure Multimedia Authoring with Dishonest Collaborators
Many systems have been proposed for protecting the intellectual property of multimedia authors and owners from the public at large, who have access to the multimedia only after it is published.
Sheppard Nicholas Paul +2 more
doaj +1 more source
For more than a decade now, radio frequency identification (RFID) technology has been quite effective in providing anti-counterfeits measures in the supply chain.
Kentaroh Toyoda +3 more
doaj +1 more source
Information technology for confirming property rights to digital images
In the modern world, the image is becoming a more powerful means of communication. In the era of digitalization, people can express their thoughts, feelings, and more through images. The main difficulty of the author is always how to prove his authorship.
Igor Ruban +2 more
doaj +1 more source

