Showing 41 - 60 results of 95 for search '"Forgery"', query time: 0.11s Refine Results
  1. 41
    by Langdon, John H.
    Published 2016
    Table of Contents: “…: The Piltdown Forgery -- Case Study 5. Checking the Time: Geological Dating at Olduvai Gorge -- Case Study 6…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 42
    Published 2009
    Table of Contents: “…-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 43
    Published 2009
    Table of Contents: “… -- Detection of Block Artifacts for Digital Forensic Analysis -- Vocal Forgery in Forensic Sciences…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 44
    Published 2013
    Table of Contents: “… at Any Key-Length -- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC -- New…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 45
    Published 2002
    Table of Contents: “… Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 46
    Published 2006
    Table of Contents: “… -- Improved Collision Search for SHA-0 -- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 47
    Published 2018
    Full Text via HEAL-Link
    Electronic eBook
  8. 48
    Published 2007
    Table of Contents: “… -- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme -- Public Key Cryptography -- : A…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 49
    by Vacca, John R.
    Published 2007
    Table of Contents: “…? -- Thwarting Counterfeiters and Forgery to Retain Integrity -- The Forger’s Arsenal -- Shielding your Assets…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 50
    Published 2012
    Table of Contents: “…. Vibrational Spectroscopy as a Tool for Tracing Art Forgeries / A Deneckere, P Vandenabeele, L Moens…”
    Full Text via HEAL-Link
    eBook
  11. 51
    Published 2017
    Table of Contents: “…. Detection Algorithm for Copy-Move Forgery Based on Circle Block -- Chapter 33. FPGA Implementation of GMM…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 52
    Published 2012
    Table of Contents: “… or Voice Forgery. 17. Applying Lessons Learned from Commercial Voice Biometric Deployments to Forensic…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 53
    Published 2012
    Table of Contents: “… for Detecting Email Forgery.- AIGG Threshold Based HTTP GET Flooding Attack Detection.- Implementation of GESNIC…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 54
    Published 2000
    Table of Contents: “… Groups -- Message Authentication -- Key Recovery and Forgery Attacks on the MacDES MAC Algorithm -- CBC…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 55
    Published 2010
    Table of Contents: “… Forgery -- A Distributed Honeynet at KFUPM: A Case Study -- Aspect-Based Attack Detection in Large-Scale…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 56
    Published 2008
    Table of Contents: “…-Scale Monetary Forgery -- OpenPGP-Based Financial Instruments and Dispute Arbitration -- An Efficient…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 57
    Published 2015
    Table of Contents: “… Polynomials and Forgery Attacks on GCM -- Quadratic Time, Linear Space Algorithms for Gram-Schmidt…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 58
    Published 2012
    Table of Contents: “… of Deformable Parts with Variable B-Spline Surfaces -- Automated Image Forgery Detection through Classification…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 59
    Published 2019
    Table of Contents: “… Method For Copy-Move Forgery Detection In Digital Images -- Chapter 37. Error Detection Technique For A…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 60
    Published 1997
    Table of Contents: “… -- Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees -- Selective Forgery of RSA…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search