The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Forgery with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1995 (16) 1996-1999 (15) 2000-2001 (30) 2002 (17) 2003 (18) 2004 (30) 2005 (51) 2006 (39) 2007 (53) 2008 (51) 2009 (67) 2010 (31) 2011 (30) 2012 (45) 2013 (50) 2014 (56) 2015 (79) 2016 (74) 2017 (87) 2018 (115) 2019 (94) 2020 (122) 2021 (144) 2022 (208) 2023 (221) 2024 (82)
Publication types (Num. hits)
article(915) book(2) data(2) incollection(14) inproceedings(881) phdthesis(10) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 411 occurrences of 256 keywords

Results
Found 1825 publication records. Showing 1825 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
85Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks
75Lei Shi, Shenghui Su, Zhengrong Xiang Design of a Passport Anti-forgery System Based on Digital Signature Schemes. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Passport anti-forgery, IC chip, Client / server, Algorithm, Digital signature scheme
64Shenghui Su, Yongquan Cai, Changxiang Shen The Banknote Anti-forgery System Based on Digital Signature Algorithms. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anti-forgery, Preliminary design, Verification, Digital signature
64Vamsi Krishna Madasu, Mohd. Hafizuddin Mohd. Yusof, Madasu Hanmandlu, Kurt Kubik Off-Line Signature Verification and Forgery Detection System Based on Fuzzy Modeling. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Box-Method, Fuzzy Modeling, Signature Verification, Forgery detection
61Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv
61Jorge Guajardo, Bart Preneel, Pim Tuyls, Ahmad-Reza Sadeghi 09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
61Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls 09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
56Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet Vocal Forgery in Forensic Sciences. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF disguised voices, identification, SVM classifier, voice conversion
56Y. J. Song, R. Z. Liu, T. N. Tan Digital Watermarking for Forgery Detection in Printed Materials. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
53Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Attack, Timestamp, Nonce
53Edson J. R. Justino, Flávio Bortolozzi, Robert Sabourin Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries. Search on Bibsonomy ICDAR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
51Chou Chen Yang, Ren-Chiun Wang An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, smart card, password, forgery attack
51Flor Ramírez Rioja, Mariko Nakano-Miyatake, Héctor M. Pérez Meana, Karina Toscano Dynamics features Extraction for on-Line Signature verification. Search on Bibsonomy CONIELECOMP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF extraction of dynamics characteristics, forgery detection and off-line signature verification, Signature verification, dynamics verification
51Najah Muhammad, Muhammad Hussain 0001, Ghulam Muhammad, George Bebis Copy-Move Forgery Detection Using Dyadic Wavelet Transform. Search on Bibsonomy CGIV The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Image forgery detection, non-intrusive method, copy-move forgery, denoising
51Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou Fast Forgery Detection with the Intrinsic Resampling Properties. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF image forgery, intrinsic resampling properties, resampling, forgery detection
48Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bleichenbacher’s forgery attack, RSASSA-PKCS-v1_5, time-stamp forgery, Acrobat, Acrobat Reader
48Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls (eds.) Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009 Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
48Darko Kirovski Anti-Counterfeiting: Mixing the Physical and the Digital World. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
48Boris Skoric, Marc X. Makkes Simplification of Controlled PUF primitives. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
48Philippe Teuwen How to Make Smartcards Resistant to Hackers' Lightsabers? Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
48Patrick Schaumont Engineering On-Chip Thermal Effects. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
48Boris Skoric, Pim Tuyls An efficient fuzzy extractor for limited noise. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
45Yongdong Wu, Feng Bao 0001, Robert H. Deng Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45E. S. Gopi Subbu, N. Lakshmanan, T. Gokul, S. KumaraGanesh, Prerak R. Shah Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Arjen K. Lenstra, Igor E. Shparlinski Selective Forgery of RSA Signatures with Fixed-Pattern Padding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Karl Brincat, Chris J. Mitchell New CBC-MAC Forgery Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner A Remark on a Signature Scheme Where Forgery Can Be Proved. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
43Babak Mahdian, Stanislav Saic Detection of Near-Duplicated Image Regions. Search on Bibsonomy Computer Recognition Systems 2 The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Ziqing Mao, Ninghui Li, Ian M. Molloy Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cross-Site Request Forgery, Web Security, Browser Security
43Adam Barth, Collin Jackson, John C. Mitchell Robust defenses for cross-site request forgery. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cross-site request forgery, http referer header, web application firewall, same-origin policy
43Seung-Jin Ryu, Hae-Yeoun Lee, Il-Weon Cho, Heung-Kyu Lee Document Forgery Detection with SVM Classifier and Image Quality Measures. Search on Bibsonomy PCM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF printer identification, Digital forensics, SVM classifier, forgery detection, image quality measures
43Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh Forgery attack on the RPC incremental unforgeable encryption scheme. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF incremental encryption, forgery attack
40Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo An Improvement of Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line Dictionary Attack, Bilinear Pairing, Mutual Authentication, Replay Attack, Forgery Attack
40Jiqiang Lu Security Weaknesses in Two Proxy Signature Schemes. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key cryptology, Proxy signature, Forgery attack
40Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack
40Katsuyuki Okeya, Tetsu Iwata Side Channel Attacks on Message Authentication Codes. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Selective Forgery, MACs, Side Channel Attacks, DPA, SPA
40SungJun Min, Go Yamamoto, Kwangjo Kim Weak Property of Malleability in NTRUSign. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF NTRUSign, Strong Existential Forgery, Centered Norm, Digital Signature Scheme, Malleability
40Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery
40Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk RSA-Based Fail-Stop Signature Schemes. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Fail-Stop Signature Schemes, Proof of Forgery, RSA
35Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, Chiou-Ting Hsu Video forgery detection using correlation of noise residue. Search on Bibsonomy MMSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Jean Hennebert, Renato Loeffel, Andreas Humm, Rolf Ingold A New Forgery Scenario Based on Regaining Dynamics of Signature. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Chunbo Ma, Jun Ao, Jianhua Li 0001 Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. Search on Bibsonomy HCI (15) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chameleon, Authentication, Key Agreement, Deniability
35Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama Analysis on Bleichenbacher's Forgery Attack. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Weiqi Luo 0001, Jiwu Huang, Guoping Qiu Robust Detection of Region-Duplication Forgery in Digital Image. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Alisher Kholmatov, Berrin A. Yanikoglu SUSIG: an on-line signature database, associated protocols and benchmark results. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Database, Biometrics, On-line signature verification
32Yanlin Qin, Xiaoping Wu Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Tran Van Lanh, Kai-Sen Chong, Sabu Emmanuel, Mohan S. Kankanhalli A Survey on Digital Camera Image Forensic Methods. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Tian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie, Mao-Pei Tsui Physics-motivated features for distinguishing photographic images and computer graphics. Search on Bibsonomy ACM Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF computer graphics, fractal, steganalysis, differential geometry, image authentication, natural image statistics, image forensics
32Hikaru Morita, D. Sakamoto, Tetsu Ohishi, Yoshimitsu Komiya, Takashi Matsumoto 0001 On-Line Signature Verifier Incorporating Pen Position, Pen Pressure, and Pen Inclination Trajectories. Search on Bibsonomy AVBPA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Reihaneh Safavi-Naini, Willy Susilo Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Bin Fang 0001, Y. Y. Wang, Cheung H. Leung, Yuan Yan Tang, Paul C. K. Kwok, K. W. Tse 0001, Y. K. Wong A Smoothness Index based Approach for Off-line Signature Verification. Search on Bibsonomy ICDAR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
32Bart Preneel, Paul C. van Oorschot On the Security of Two MAC Algorithms. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
32Jirí Grim, Petr Somol, Pavel Pudil Digital Image Forgery Detection by Local Statistical Models. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF local statistical models, distribution mixtures, EM algorithm, forgery detection
32Jung Yeon Hwang, Dong Hoon Lee 0001, Moti Yung Universal forgery of the identity-based sequential aggregate signature scheme. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sequential aggregate signature, universal forgery, identity-based cryptography
32Hailing Huang, Weiqiang Guo, Yu Zhang Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm. Search on Bibsonomy PACIIA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF copy-move forgery, Image processing, feature matching, keypoints
32Won-Du Chang, Jungpil Shin 0001 DPW Approach for Random Forgery Problem in Online Handwritten Signature Verification. Search on Bibsonomy NCM (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online Signature Verification, Random Forgery Problem, Dynamic Positional Warping, Dynamic Time Warping
29Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 New Birthday Attacks on Some MACs Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack
29Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji SOMA: mutual approval for included content in web pages. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cross-site request forgery (XSRF), javascript, web security, cross-site scripting (XSS), same origin policy
29Fagen Li, Masaaki Shirase, Tsuyoshi Takagi On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack
29Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper Collision Attacks on AES-Based MAC: Alpha-MAC. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alpha-MAC, selective forgery, MAC, AES, side-channel attack, message authentication codes, collision attack
29Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern Index Calculation Attacks on RSA Signature and Encryption. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalsis, Index Calculation, ISO 9796, RSA, smoothness, signature, forgery
29Guilin Wang Security Analysis of Several Group Signature Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signature, group signature, forgery
29Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan Secure and Efficient Digital Coins. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF digital coins, electronic cash systems, complex online computations, payment phase, off-line anonymous cash scheme, payment transactions, unconditional client anonymity, double-spending detection, coin forgery, framing attacks, security, efficiency, EFTS
26Litty Koshy, S. Prayla Shyry YOLO-FORGERY: Forgery Detection in images via Deep Clifford gradient-based YOLOv4 Network. Search on Bibsonomy Signal Image Video Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Decheng Liu, Zeyang Zheng, Chunlei Peng, Yukai Wang, Nannan Wang 0001, Xinbo Gao 0001 Hierarchical Forgery Classifier on Multi-Modality Face Forgery Clues. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Jiahe Tian, Peng Chen, Cai Yu, Xiaomeng Fu, Xi Wang 0014, Jiao Dai, Jizhong Han Learning to Discover Forgery Cues for Face Forgery Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Yukai Wang, Chunlei Peng, Decheng Liu, Nannan Wang 0001, Xinbo Gao 0001 Spatial-Temporal Frequency Forgery Clue for Video Forgery Detection in VIS and NIR Scenario. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Decheng Liu, Tao Chen, Chunlei Peng, Nannan Wang 0001, Ruimin Hu, Xinbo Gao 0001 Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex C. Kot Forgery-aware Adaptive Vision Transformer for Face Forgery Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Sami Gazzah, Lamia Rzouga Haddada, Isam Shallal, Najoua Essoukri Ben Amara Digital Image Forgery Detection with Focus on a Copy-Move Forgery Detection: A Survey. Search on Bibsonomy CW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Decheng Liu, Zeyang Zheng, Chunlei Peng, Yukai Wang, Nannan Wang 0001, Xinbo Gao 0001 Hierarchical Forgery Classifier On Multi-modality Face Forgery Clues. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Jianshu Li, Man Luo, Jian Liu, Tao Chen, Chengjie Wang, Ziwei Liu, Shuo Liu, Kewei Yang, Xuning Shao, Kang Chen, Boyuan Liu, Mingyu Guo, Ying Guo, Yingying Ao, Pengfei Gao Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Yukai Wang, Chunlei Peng, Decheng Liu, Nannan Wang 0001, Xinbo Gao 0001 Spatial-Temporal Frequency Forgery Clue for Video Forgery Detection in VIS and NIR Scenario. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Long Zhuo, Shunquan Tan, Bin Li 0011, Jiwu Huang Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Long Zhuo, Shunquan Tan, Bin Li 0011, Jiwu Huang Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
26Somayeh Sadeghi, Sajjad Dadkhah, Hamid Abdullah Jalab, Giuseppe Mazzola, Diaa M. Uliyan State of the art in passive digital image forgery detection: copy-move image forgery. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Isilay Bozkurt, Mustafa Hakan Bozkurt, Güzin Ulutas A new video forgery detection approach based on forgery line. Search on Bibsonomy Turkish J. Electr. Eng. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Timothy K. Shih, Joseph C. Tsai, Nick C. Tang, Shih-Ming Chang, Yaurice Y. Lin Video Forgery and Special Effect Production. Search on Bibsonomy IVIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Timothy K. Shih, Joseph C. Tsai, Nick C. Tang, Shih-Ming Chang, Yaurice Y. Lin Video Forgery. Search on Bibsonomy FGIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Jin Chen 0005, Daniel P. Lopresti, Fabian Monrose Toward Resisting Forgery Attacks via Pseudo-Signatures. Search on Bibsonomy ICDAR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Renaud Feil, Louis Nyffenegger Evolution of cross site request forgery attacks. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Ming Bao Forgery-location highway monitoring systembased on video watermarking. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt Combating digital document forgery using new secure information hiding algorithm. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Scott Contini, Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Anoop M. Namboodiri, Shailesh Saini, Xiaoguang Lu, Anil K. Jain 0001 Skilled Forgery Detection in On-Line Signatures: A Multimodal Approach. Search on Bibsonomy ICBA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Jinhong Katherine Guo, David S. Doermann, Azriel Rosenfeld Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties. Search on Bibsonomy ICPR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Message Authentication Codes, CBC-MAC
24Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
21Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh An improvement of Xu et al.'s authentication scheme using smart cards. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cryptography, network security, smart card, hash function, password, authentication protocol
21Yu Sasaki Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DMMD, collision, HMAC, second preimage, AURORA
21Danjun Pu, Gregory R. Ball, Sargur N. Srihari A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inference. Search on Bibsonomy IWCF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Vivian L. Blankers, C. Elisa van den Heuvel, Katrin Franke, Louis Vuurpijl ICDAR 2009 Signature Verification Competition. Search on Bibsonomy ICDAR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Qiming Li, Sujoy Roy On the security of non-forgeable robust hash functions. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Jinsong Gui, Xiaoheng Deng An Adaptive Topology-Based Reputation Model for Unstructured P2P Networks. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Nick C. Tang, Timothy K. Shih, Hong-Yuan Mark Liao, Joseph C. Tsai, Hsing-Ying Zhong Motion extrapolation for video story planning. Search on Bibsonomy ACM Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF layer segmentation, tracking, special effect, video inpainting
Displaying result #1 - #100 of 1825 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license