-
41by Langdon, John H.Table of Contents: “…: The Piltdown Forgery -- Case Study 5. Checking the Time: Geological Dating at Olduvai Gorge -- Case Study 6…”
Published 2016
Full Text via HEAL-Link
Electronic eBook -
42Published 2009Table of Contents: “…-forgery System Based on Digital Signature Schemes -- A Chronological Evaluation of Unknown Malcode…”
Full Text via HEAL-Link
Electronic eBook -
43Published 2009Table of Contents: “… -- Detection of Block Artifacts for Digital Forensic Analysis -- Vocal Forgery in Forensic Sciences…”
Full Text via HEAL-Link
Electronic eBook -
44Published 2013Table of Contents: “… at Any Key-Length -- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC -- New…”
Full Text via HEAL-Link
Electronic eBook -
45Published 2002Table of Contents: “… Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed…”
Full Text via HEAL-Link
Electronic eBook -
46Published 2006Table of Contents: “… -- Improved Collision Search for SHA-0 -- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash…”
Full Text via HEAL-Link
Electronic eBook -
47
-
48Published 2007Table of Contents: “… -- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme -- Public Key Cryptography -- : A…”
Full Text via HEAL-Link
Electronic eBook -
49by Vacca, John R.Table of Contents: “…? -- Thwarting Counterfeiters and Forgery to Retain Integrity -- The Forger’s Arsenal -- Shielding your Assets…”
Published 2007
Full Text via HEAL-Link
Electronic eBook -
50Published 2012Table of Contents: “…. Vibrational Spectroscopy as a Tool for Tracing Art Forgeries / A Deneckere, P Vandenabeele, L Moens…”
Full Text via HEAL-Link
eBook -
51Published 2017Table of Contents: “…. Detection Algorithm for Copy-Move Forgery Based on Circle Block -- Chapter 33. FPGA Implementation of GMM…”
Full Text via HEAL-Link
Electronic eBook -
52Published 2012Table of Contents: “… or Voice Forgery. 17. Applying Lessons Learned from Commercial Voice Biometric Deployments to Forensic…”
Full Text via HEAL-Link
Electronic eBook -
53Published 2012Table of Contents: “… for Detecting Email Forgery.- AIGG Threshold Based HTTP GET Flooding Attack Detection.- Implementation of GESNIC…”
Full Text via HEAL-Link
Electronic eBook -
54Published 2000Table of Contents: “… Groups -- Message Authentication -- Key Recovery and Forgery Attacks on the MacDES MAC Algorithm -- CBC…”
Full Text via HEAL-Link
Electronic eBook -
55Published 2010Table of Contents: “… Forgery -- A Distributed Honeynet at KFUPM: A Case Study -- Aspect-Based Attack Detection in Large-Scale…”
Full Text via HEAL-Link
Electronic eBook -
56Published 2008Table of Contents: “…-Scale Monetary Forgery -- OpenPGP-Based Financial Instruments and Dispute Arbitration -- An Efficient…”
Full Text via HEAL-Link
Electronic eBook -
57Published 2015Table of Contents: “… Polynomials and Forgery Attacks on GCM -- Quadratic Time, Linear Space Algorithms for Gram-Schmidt…”
Full Text via HEAL-Link
Electronic eBook -
58Published 2012Table of Contents: “… of Deformable Parts with Variable B-Spline Surfaces -- Automated Image Forgery Detection through Classification…”
Full Text via HEAL-Link
Electronic eBook -
59Published 2019Table of Contents: “… Method For Copy-Move Forgery Detection In Digital Images -- Chapter 37. Error Detection Technique For A…”
Full Text via HEAL-Link
Electronic eBook -
60Published 1997Table of Contents: “… -- Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees -- Selective Forgery of RSA…”
Full Text via HEAL-Link
Electronic eBook