To see the other types of publications on this topic, follow the link: Digital attacks.

Dissertations / Theses on the topic 'Digital attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Digital attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Yan. "Digital Video Watermarking Robust to Geometric Attacks and Compressions." Thesis, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20281.

Full text
Abstract:
This thesis focuses on video watermarking robust against geometric attacks and video compressions. In addition to the requirements for an image watermarking algorithm, a digital video watermarking algorithm has to be robust against advanced video compressions, frame loss, frame swapping, aspect ratio change, frame rate change, intra- and inter-frame filtering, etc. Video compression, especially, the most efficient compression standard, H.264, and geometric attacks, such as rotation and cropping, frame aspect ratio change, and translation, are considered the most challenging attacks for video w
APA, Harvard, Vancouver, ISO, and other styles
2

Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.

Full text
Abstract:
Social engineering (SE) attacks are one of the most common cyber attacks and frauds, which causes a large economical destruction to individuals, companies and governments alike. The attacks are hard to protect from, since SE-attacks is based on exploiting human weaknesses. The goal of this study is to identify indicators of resilience against SE-attacks from individual computer space data, such as network settings, social media profiles, web browsing behaviour and more. This study is based on qualitative methods to collect information, analyse and evaluate data. Resilience is evaluated with mo
APA, Harvard, Vancouver, ISO, and other styles
3

Su, Karen. "Digital video watermarking principles for resistance to collusion and interpolation attacks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ63030.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Full text
Abstract:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTER
APA, Harvard, Vancouver, ISO, and other styles
5

Holm, Linnéa. "Cyber attacks & coercion in the digital era. : A qualitative case analysis of the North Korean cyber attack on Sony Pictures." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323583.

Full text
Abstract:
The 2014 cyber attack on Sony Pictures Entertainment is an example of a disruptive event where a nation state utilized cyber tools in order to coerce a target into changing their course of action. Cyber attacks, something that might be perceived as a looming futuristic threat, became reality for Sony and its employees under the course of a few months in late 2014. The coercer’s attempt to change the behavior of the company eventually failed and North Korea who was attributed as coercer was imposed with new sanctions. This paper takes on the task of evaluating the Sony case against both the tra
APA, Harvard, Vancouver, ISO, and other styles
6

Steiner, Hrafn. "Coercive instruments in the digital age : The cases of cyber-attacks against Estonia and Iran." Thesis, Försvarshögskolan, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-5273.

Full text
Abstract:
In the wake of the cyber-attacks in 2007 against Estonia and in 2010 against Iran, academics have debated the character of cyberwar. This study applies the theories of coercive diplomacy to the cases of Estonia and Iran in order to explain cyber-attacks as instrument for coercive diplomacy. While the long term effects of the attacks have yet to be understood it is clear that cyber-attacks can, and will, become a serious threat against political decision-makers in times of conflict.
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Chun-Ching Andy. "Using identity-based privacy-protected access control filter FILTER (IPACF) to against denial of service attacks and protect user privacy." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/HUANG_CHUN-CHING_20.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ge, Shizun. "Design of reliable and secure devices by algebraic manipulation codes." Thesis, Boston University, 2012. https://hdl.handle.net/2144/21153.

Full text
Abstract:
Thesis (M.Sc.Eng.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.<br>In this thesis, we firstly present the secure multipliers protected by the AMD codes, and demonstrate that the fault masking probabilities are not worse than the results based on the theoretical analysis of error masking proba
APA, Harvard, Vancouver, ISO, and other styles
9

Mouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.

Full text
Abstract:
The new and upcoming field of wireless sensor networking is unfortunately still lacking in terms of both digital forensics and security. All communications between different nodes (also known as motes) are sent out in a broadcast fashion. These broadcasts make it quite difficult to capture data packets forensically and, at the same time, retain their integrity and authenticity. The study presents several attacks that can be executed successfully on a wireless sensor network, after which the dissertation delves more deeply into the flooding attack as it is one of the most difficult attacks to a
APA, Harvard, Vancouver, ISO, and other styles
10

Keskinarkaus, A. (Anja). "Digital watermarking techniques for printed images." Doctoral thesis, Oulun yliopisto, 2013. http://urn.fi/urn:isbn:9789526200583.

Full text
Abstract:
Abstract During the last few decades, digital watermarking techniques have gained a lot of interest. Such techniques enable hiding imperceptible information to images; information which can be extracted later from those images. As a result, digital watermarking techniques have many interesting applications for example in Internet distribution. Contents such as images are today manipulated mainly in digital form; thus, traditionally, the focus of watermarking research has been the digital domain. However, a vast amount of images will still appear in some physical format such as in books, poster
APA, Harvard, Vancouver, ISO, and other styles
11

Alatram, Ala'a A. M. "A forensic framework for detecting denial-of-service attacks in IoT networks using the MQTT protocol." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2561.

Full text
Abstract:
In the domain of the Internet of Things (IoT), The Message Queueing Telemetry Protocol (MQTT) is the most widely used protocol for applications across a wide range of realms, including industrial automation, healthcare, smart homes, and smart cities; MQTT is also used in many other critical real-world applicastions. An example is BMW’s Car Sharing application, that uses MQTT to provide reliable connectivity. However, due to a lack of security considerations during the design of the MQTT protocol, all the networks implementing it are prone to cyberattacks, such as denial-of-service (DoS) attack
APA, Harvard, Vancouver, ISO, and other styles
12

Weiner, Michael [Verfasser], Georg [Akademischer Betreuer] Sigl, Bou Salvador [Gutachter] Manich, and Georg [Gutachter] Sigl. "Hardening Digital Circuits against Invasive Attacks with On-Chip Delay Measurements / Michael Weiner ; Gutachter: Salvador Manich Bou, Georg Sigl ; Betreuer: Georg Sigl." München : Universitätsbibliothek der TU München, 2020. http://d-nb.info/122431333X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Салієва, О. В. "Дослідження захищеності протоколу сліпого електронного цифрового підпису Чаума". Thesis, ВНТУ, 2018. http://ir.lib.vntu.edu.ua//handle/123456789/21230.

Full text
Abstract:
В доповіді здійснено аналіз захищеності протоколу сліпого електронного цифрового підпису, що базується на криптосистемі RSA. Враховано чотири складові безпечної схеми сліпого підпису. Досліджено основні моделі атак на сліпий електронний цифровий підпис Чаума.<br>The report analyzes the security of a blind electronic digital signature protocol based on the RSA cryptosystem. The four components of the safe signature blind pattern are taken into account. The main models of attacks on the blind electronic digital signature of Chaum are investigated.
APA, Harvard, Vancouver, ISO, and other styles
14

Camurati, Giovanni. "Security Threats Emerging from the Interaction Between Digital Activity and Radio Transceiver." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS279.

Full text
Abstract:
Les ordiphones et les objets connectés utilisent des radio pour communiquer avec d’autres appareils électroniques. Ces radio sont placées à côté du processeur et des autres composants numériques. Par exemple, dans les ordiphones un processeur, une mémoire et plusieurs émetteurs-récepteurs radio se trouvent sur la même plateforme. Les systèmes embarquées, plus simples, utilisent souvent des puces à signaux mixtes contenant à la fois un microcontrôleur et un émetteur-récepteur. La proximité physique entre les blocs numériques, qui produisent un bruit électromagnétique très fort, et les émetteurs
APA, Harvard, Vancouver, ISO, and other styles
15

Shanmugam, Karthikeyan. "Validating digital forensic evidence." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/7651.

Full text
Abstract:
This dissertation focuses on the forensic validation of computer evidence. It is a burgeoning field, by necessity, and there have been significant advances in the detection and gathering of evidence related to electronic crimes. What makes the computer forensics field similar to other forensic fields is that considerable emphasis is placed on the validity of the digital evidence. It is not just the methods used to collect the evidence that is a concern. What is also a problem is that perpetrators of digital crimes may be engaged in what is called anti-forensics. Digital forensic evidence techn
APA, Harvard, Vancouver, ISO, and other styles
16

Jeong, Taehoon. "Secure analog-to-digital conversion against power side-channel attack." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127018.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020<br>Cataloged from the official PDF of thesis.<br>Includes bibliographical references (pages 125-129).<br>At the interface between analog circuits and a digital processor, an ADC can create a critical hardware security loophole. By exploiting the power side-channel leakage of the ADC, an attacker can expose the private signal chain data. Having recognized the security threat, this thesis explores both aspects of the SAR ADC power side-channel attack (PSA): attack method an
APA, Harvard, Vancouver, ISO, and other styles
17

Gomina, Kamil. "Méthodologie et développement de solutions pour la sécurisation des circuits numériques face aux attaques en tensions." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0751.

Full text
Abstract:
Les applications grand public comme la téléphonie mobile ou les cartes bancaires manipulent des données confidentielles. A ce titre, les circuits qui les composent font de plus en plus l'objet d'attaques qui présentent des menaces pour la sécurité des données. Les concepteurs de systèmes sur puce (SoC) doivent donc proposer des solutions sécurisées, tout en limitant le coût et la complexité globale des applications. L’analyse des attaques existantes sur les circuits numériques nous a orienté vers celles se basant sur la tension d'alimentation, dans des nœuds technologiques avancés.Dans un prem
APA, Harvard, Vancouver, ISO, and other styles
18

Flucke, Thomas J. "IDENTIFICATION OF USERS VIA SSH TIMING ATTACK." DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2208.

Full text
Abstract:
Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Lin
APA, Harvard, Vancouver, ISO, and other styles
19

Nyeem, Hussain Md Abu. "A digital watermarking framework with application to medical image security." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/74749/1/Hussain%20Md%20Abu_Nyeem_Thesis.pdf.

Full text
Abstract:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contrib
APA, Harvard, Vancouver, ISO, and other styles
20

kalle, Sushma. "Semantic-aware Stealthy Control Logic Infection Attack." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2512.

Full text
Abstract:
In this thesis work we present CLIK, a new, automated, remote attack on the control logic of a programmable logic controller (PLC) in industrial control systems. The CLIK attack modifies the control logic running in a remote target PLC automatically to disrupt a physical process. We implement the CLIK attack on a real PLC. The attack is initiated by subverting the security measures that protect the control logic in a PLC. We found a critical (zero-day) vulnerability, which allows the attacker to overwrite password hash in the PLC during the authentication process. Next, CLIK retrieves and deco
APA, Harvard, Vancouver, ISO, and other styles
21

Gauravaram, Praveen Srinivasa. "Cryptographic hash functions : cryptanalysis, design and applications." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16372/.

Full text
Abstract:
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping, and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. The standard and widely used hash functions such as MD5 and SHA-1 follow the design principle of Merkle-Damgard iterated hash function construction which was presented independently by Ivan Damgard and Ralph Merkle at Crypto'89. It has been established that neither these hash functions
APA, Harvard, Vancouver, ISO, and other styles
22

Gauravaram, Praveen. "Cryptographic hash functions : cryptanalysis, design and applications." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16372/1/Praveen_Gauravaram_Thesis.pdf.

Full text
Abstract:
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals such as authenticity, digital signatures, digital time stamping, and entity authentication. They are also strongly related to other important cryptographic tools such as block ciphers and pseudorandom functions. The standard and widely used hash functions such as MD5 and SHA-1 follow the design principle of Merkle-Damgard iterated hash function construction which was presented independently by Ivan Damgard and Ralph Merkle at Crypto'89. It has been established that neither these hash functions
APA, Harvard, Vancouver, ISO, and other styles
23

Hatoum, Makram. "Digital watermarking for PDF documents and images : security, robustness and AI-based attack." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD016.

Full text
Abstract:
Le développement technologique a ses avantages et ses inconvénients. Nous pouvons facilement partager et télécharger du contenu numérique en utilisant l’Internet. En outre, les utilisateurs malveillants peuvent aussi modifier, dupliquer et diffuser illégalement tout type d'informations, comme des images et des documents. Par conséquent, nous devons protéger ces contenus et arrêter les pirates. Le but de cette thèse est de protéger les documents PDF et les images en utilisant la technique de tatouage numérique Spread Transform Dither Modulation (STDM), tout en tenant compte des exigences princi
APA, Harvard, Vancouver, ISO, and other styles
24

Bartone, Christopher A. "News Media Narrative and the Iraq War, 2001-2003: How the Classical Hollywood Narrative Style Dictates Storytelling Techniques in Mainstream Digital News Media and Challenges Traditional Ethics in Journalism." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1149531650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Josyula, Sai Prashanth. "On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10820.

Full text
Abstract:
Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. The attacks that target an implementation of a cryptosystem are known as side-channel attacks. The Flush+Reload attack is a cache side-channel attack that relies on cache hits/misses to recover secret information from the target program execution. In elliptic curve cryptosystems, side-channel attacks are particularly targeted towards the po
APA, Harvard, Vancouver, ISO, and other styles
26

Hassoune, Ilham. "Design and optimization of digital circuits for low power and security applications." Université catholique de Louvain, 2006. http://edoc.bib.ucl.ac.be:81/ETD-db/collection/available/BelnUcetd-06292006-113241/.

Full text
Abstract:
Since integration technology is approaching the nanoelectronics range, some practical limits are being reached. Leakage power is increasing more and more with the continuous scaling, and design of clock distribution systems needs to be reconsidered as it becomes difficult to deal with performance and power consumption specifications while keeping a correct synchronisation in modern multi-GHz systems. The ongoing technology trend will become difficult to maintain unless dedicated library cells, new logic styles and circuit methods are emerging to prevent the drawbacks of future nanoscale circui
APA, Harvard, Vancouver, ISO, and other styles
27

Yieh, Pierson. "Vehicle Pseudonym Association Attack Model." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1840.

Full text
Abstract:
With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. Bu
APA, Harvard, Vancouver, ISO, and other styles
28

Anto, Morais Faustina J. "Implementation of Cache Attack on Real Information Centric Networking System." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/834.

Full text
Abstract:
Network security is an ongoing major problem in today’s Internet world. Even though there have been simulation studies related to denial of service and cache attacks, studies of attacks on real networks are still lacking in the research. In this thesis, the effects of cache attacks in real information-centric networking systems were investigated. Cache attacks were implemented in real networks with different cache sizes and with Least Recently Used, Random and First In First Out algorithms to fill the caches in each node. The attacker hits the cache with unpopular content, making the user requ
APA, Harvard, Vancouver, ISO, and other styles
29

Honeker, Kenneth S. "An analysis of using intelligent digital data to reduce the spare and repair parts inventory for the New Attack Submarine (NSSN)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341330.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, September 1997.<br>"September 1997." Thesis advisor(s): Kenneth J. Euske, Alan W. McMasters. Includes bibliographical references (p. 139-152). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
30

Pinto, Allan da Silva 1984. "A countermeasure method for video-based face spoofing attacks : Detecção de tentativas de ataque com vídeos digitais em sistemas de biometria de face." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275616.

Full text
Abstract:
Orientador: Anderson de Rezende Rocha<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação<br>Made available in DSpace on 2018-08-23T22:22:57Z (GMT). No. of bitstreams: 1 Pinto_AllandaSilva_M.pdf: 47523880 bytes, checksum: 072eb0490c26631b80cdcc47d55a4817 (MD5) Previous issue date: 2013<br>Resumo: O resumo poderá ser visualizado no texto completo da tese digital<br>Abstract: The complete abstract is available with the full electronic document<br>Mestrado<br>Ciência da Computação<br>Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
31

Trabelsi, Anis. "Robustesse aux attaques en authentification digitale par apprentissage profond." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS580.

Full text
Abstract:
L'identité des personnes sur Internet devient un problème de sécurité majeur. Depuis les accords de Bale, les institutions bancaires ont intégré la vérification de l'identité des personnes ou Know Your Customer (KYC) dans leur processus d'inscription. Avec la dématérialisation des banques, cette procédure est devenue l'e-KYC ou KYC à distance qui fonctionne à distance via le smartphone de l'utilisateur. De même, la vérification d'identité à distance est devenue la norme pour l'inscription aux outils de signature électronique. De nouvelles réglementations émergent pour sécuriser cette approche,
APA, Harvard, Vancouver, ISO, and other styles
32

Zhuk, Alesia. "Does international human rights law impose constraints on digital manipulation or other cyberwarfare ruses? Analysis of the stuxnet worm attack on iranian nuclear facilities." Tesis, Universidad de Chile, 2017. http://repositorio.uchile.cl/handle/2250/170163.

Full text
Abstract:
Tesis (magíster en derecho económico, inversiones, comercio y arbitraje internacional) Universidad de Chile, Universidad de Heidelberg<br>In 2010 a malicious computer worm attacked Iranian nuclear facilities in Natanz. It was the first computer worm that caused physical damage, and because of this, Iran had to suspend its nuclear program approximately for two years. The case caused great concern among the international community and raised the issue of protecting the population. This paper will address the issues of cyber war and its relationship with International Humanitarian Law and Inter
APA, Harvard, Vancouver, ISO, and other styles
33

Inam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.

Full text
Abstract:
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero &amp; Llorente, 2012). A distinctive cloud is affected by different security issues such as Temporary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011). The pur
APA, Harvard, Vancouver, ISO, and other styles
34

Baumann, Judith Marie. "Fabricated Histories (or My American Daydreams)." VCU Scholars Compass, 2005. http://scholarscompass.vcu.edu/etd_retro/144.

Full text
Abstract:
The three print series I completed within the past two years appear hardly related at first. However, these individual bodies of work, when examined chronologically, are continually informed by similar ideas. The most obvious of these is the act of piecing elements together to form something that had previously not existed, yet still influences the original source. In all three series, images are taken from an original source and re-contextualized. The idea of cultural or anthropological landscapes is also a theme throughout my work. Each individual series toyed with the idea of an imaginary o
APA, Harvard, Vancouver, ISO, and other styles
35

Ginman, Johan. "En modell för utformandet av biografiska ordböcker." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20165.

Full text
Abstract:
Every website, computer and IT system have users who need to verify their identity throughauthentication. The most common form of authentication today is to apply an alphanumericpassword. Passwords are often based on biographical information that can be derived from the userhimself and common elements that are usually utilized while creating passwords are names, petnames, family related, and date of birth. While passwords today are often based on the individual'sbiographical elements, the police have problems cracking encrypted devices because it takes a longtime and is complex to identify the
APA, Harvard, Vancouver, ISO, and other styles
36

Falade, Joannes Chiderlos. "Identification rapide d'empreintes digitales, robuste à la dissimulation d'identité." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC231.

Full text
Abstract:
La biométrie est de plus en plus utilisée à des fins d’identification compte tenu de la relation étroite entre la personne et son identifiant (comme une empreinte digitale). Nous positionnons cette thèse sur la problématique de l’identification d’individus à partir de ses empreintes digitales. L’empreinte digitale est une donnée biométrique largement utilisée pour son efficacité, sa simplicité et son coût d’acquisition modeste. Les algorithmes de comparaison d’empreintes digitales sont matures et permettent d’obtenir en moins de 500 ms un score de similarité entre un gabarit de référence (stoc
APA, Harvard, Vancouver, ISO, and other styles
37

Gaber, Tarek. "Support consumers' rights in DRM : a secure and fair solution to digital license reselling over the Internet." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/support-consumers-rights-in-drm-a-secure-and-fair-solution-to-digital-license-reselling-over-the-internet(6b653587-36d3-4074-8578-5eaacdb68004).html.

Full text
Abstract:
Consumers of digital contents are empowered with numerous technologies allowing them to produce perfect copies of these contents and distribute them around the world with little or no cost. To prevent illegal copying and distribution, a technology called Digital Rights Management (DRM) is developed. With this technology, consumers are allowed to access digital contents only if they have purchased the corresponding licenses from license issuers. The problem, however, is that those consumers are not allowed to resell their own licenses- a restriction that goes against the first-sale doctrine. En
APA, Harvard, Vancouver, ISO, and other styles
38

Vibert, Benoît. "Contributions à l'évaluation de systèmes biométriques embarqués." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMC208/document.

Full text
Abstract:
La biométrie suscite de plus en plus d’intérêt de la part des industriels car nous avons besoin de nouvelles méthodes d’authentification d’un individu : pour du contrôle d’accès physique, du contrôle aux frontières ou pour du paiement. Ces données non révocables et sensibles sont très souvent stockées sur des systèmes embarqués de type élément sécurisé (SE), comme par exemple une carte à puce. Ces SE embarquent aussi un module de comparaison nommé On-Card-Comparison (OCC), permettant de déterminer si le template présenté correspond bien à celui stocké sur l’élément sécurisé. Dans cette thèse,
APA, Harvard, Vancouver, ISO, and other styles
39

Rehman, Abdul. "Practical watermarking for multimedia traitor tracing." Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2024. http://www.theses.fr/2024IMTA0450.

Full text
Abstract:
La popularité des téléphones portables, des appareils photo numériques et des ordinateurs personnels a modifié la création, la consommation et le partage des contenus multimédias. Cela pose le problème de la duplication à l’infini, du téléchargement non autorisé et de la redistribution illégale. À l’ère de la distribution généralisée des informations numériques, il est plus important que jamais de développer des solutions fiables et solides pour éviter la distribution illégale. Un système d’empreinte multimédia est un moyen efficace de protéger le contenu multimédia et d’empêcher la distributi
APA, Harvard, Vancouver, ISO, and other styles
40

Faria, Gerson de Souza. "Novos ataques de canal secundário a dispositivos de entrada manual de dados confidenciais." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-22032017-080657/.

Full text
Abstract:
Esta tese apresenta três novos ataques a equipamentos de pagamento eletrônico que possuem teclado mecânico, conhecidos como \"PIN pads\". Mostramos de três formas distintas como tais equipamentos possuem vulnerabilidades de segurança na camada física que permitem o vazamento do PIN (Personal Identification Number) quando o mesmo é digitado. Demonstramos experimentalmente que é possível inferir com elevada taxa de acerto (100% em um dos ataques) a senha digitada, de forma não-invasiva. Os ataques desenvolvidos são baseados na introdução de sensores nos próprios equipamentos ou em seu ambiente d
APA, Harvard, Vancouver, ISO, and other styles
41

Hitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.

Full text
Abstract:
Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP) , which is so called because of its similarity to the discrete logarithm problem (DLP) over the integers modulo a large prime. One benefit of elliptic curve cryptosystems (ECCs) is that they can use a much shorter key length than other public key cryptosystems to provide an equivalent level of security. For example, 160 bit ECCs are believed to provide about the same level of security
APA, Harvard, Vancouver, ISO, and other styles
42

Hitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.

Full text
Abstract:
Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP) , which is so called because of its similarity to the discrete logarithm problem (DLP) over the integers modulo a large prime. One benefit of elliptic curve cryptosystems (ECCs) is that they can use a much shorter key length than other public key cryptosystems to provide an equivalent level of security. For example, 160 bit ECCs are believed to provide about the same level of security
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Yu-Wei, and 陳昱維. "Mesh-Based Robust Digital Watermarking Technique Against Geometric Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/75261036738464883554.

Full text
Abstract:
碩士<br>大同大學<br>資訊工程學系(所)<br>94<br>The great challenge of existing watermarking methods is their limited resistance to the extensive geometric attacks. Geometric attacks can be decomposed into two classes: global distortion such as rotations and translations and local distortion such as the StirMark attack. We have found that the weakness of multiple watermark embedding methods that were initially designed to resist geometric attacks is their inability to withstand the combination of geometric attacks. In this thesis, the watermark is used in the gray-scale authentication image, and a robust ima
APA, Harvard, Vancouver, ISO, and other styles
44

"On forging ElGamal signature and other attacks." 2000. http://library.cuhk.edu.hk/record=b5890386.

Full text
Abstract:
by Chan Hing Che.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2000.<br>Includes bibliographical references (leaves 59-[61]).<br>Abstracts in English and Chinese.<br>Chapter 1 --- Introduction --- p.1<br>Chapter 2 --- Background --- p.8<br>Chapter 2.1 --- Abstract Algebra --- p.8<br>Chapter 2.1.1 --- Group --- p.9<br>Chapter 2.1.2 --- Ring --- p.10<br>Chapter 2.1.3 --- Field --- p.11<br>Chapter 2.1.4 --- Useful Theorems in Number Theory --- p.12<br>Chapter 2.2 --- Discrete Logarithm --- p.13<br>Chapter 2.3 --- Solving Discrete Logarithm --- p.14<br>Chapter 2.3.1 --- Exhaustiv
APA, Harvard, Vancouver, ISO, and other styles
45

LAI, CHUN-WEI, and 賴郡緯. "Automatic web-log filtering mechanism for digital forensics of web attacks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/87100007419308086704.

Full text
Abstract:
碩士<br>國立臺北大學<br>資訊工程學系<br>104<br>As web attacks occur much more often, the demands of digital forensics increase significantly. However, most digital forensic tasks against web attack are still handled manually so the process of the digital forensics tasks is very inefficient and error-prone, especially when the size of web server logs involved in the web attack becomes very large. In order to investigate the crime evidences in the web logs referring to the web attack efficiently, an automatic mechanism of processing these web logs is highly desirable. In this paper, we present an Automatic We
APA, Harvard, Vancouver, ISO, and other styles
46

shailaja, koritala, and 夏拉喬. "A Study on full Correlation of Digital Watermarks Under Different Image Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/29354227888064522388.

Full text
Abstract:
碩士<br>國立交通大學<br>電控工程研究所<br>98<br>For the surveillance, home security and medical applications a digital watermarking scheme is needed to provide full correlation which is trivial in the normal techniques when any attack is predicted to occur. The correlation of decoded data varies according to the variations of length of the embedding data for the type of attack predicted. We believe that proper selection of length for the embedding data for any watermarking system can assure full correlation. In this thesis, we propose a framework which adds a preprocessor and a splitter for any regular water
APA, Harvard, Vancouver, ISO, and other styles
47

Lin, Liang-Ting, and 林亮廷. "A Robust Digital Image Watermarking Method against Intentional Attacks and JPEG Compression." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/91045613490216857914.

Full text
Abstract:
碩士<br>國立清華大學<br>電機工程學系<br>88<br>As the Internet and storage equipment becomes more and more populous, the digital data can distribute easy. The pirate can copy digital multimedia (images, audio, and video) limitless. Therefore people concern more about the copyright protection for digital multimedia. Digital watermarking technique can hide data in multimedia indicate the data owner or recipient, it has been recently proposed as the mean for copyright protection of multimedia data. Therefore, it is a important problem that how to detect rightful ownerships under various attacks. Accordingly, in
APA, Harvard, Vancouver, ISO, and other styles
48

Güven, Volkan. "Patterns of malware and digital attacks : A guideline for the security enthusiast." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16313.

Full text
Abstract:
Context: In today’s era, many things are dependent on the internet thus the devices and applications that are using it proliferates. Every day, many devices are getting targeted by malevolent virus authors. To protect the data from malicious factors becomes a preposterous dispute. A ransomware named CryptoLocker has caused many individuals, hospitals, and institutions thousands if not millions of dollars in damage due to encrypting the computer files thus demanding a ransom in return. Once the ransomware strikes a system, the recoverability is almost non-existent if no backup or system restore
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Jingrui. "Protecting Controllers against Denial-of-Service Attacks in Software-Defined Networks." 2016. https://scholarworks.umass.edu/masters_theses_2/428.

Full text
Abstract:
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers defense mechanism based on a proof-of-work protocol. This thesis proposes a new protocol to protect controllers against such attacks, shows implementation of the system and analyze the its performance. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of work, its adjustable difficulty, its ability to work withmultiple network providers, and its use of existing TCP
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Nai-Chun, and 王迺君. "On the Design of Digital Color Watermark with Capability of Resisting Noise and Filtering Attacks." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/30239724916990401996.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊工程研究所<br>87<br>In recent years, due to the popularity of personal computer and World Wide Web, duplication and transmission of digital data have become easier and faster. In order to avoid unauthorized copy and protect the copyright of digital images, the watermarking techniques are important issues in the field of image processing. The digital watermarking technique is introduced by embedding some invisible or unobtrusive information in digital images to identify copyright ownership. Although traditional watermarking techniques could resist most attacks such as blurring and
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!