Showing 21 - 40 results of 43 for search 'tamper (selection OR detection)', query time: 0.09s Refine Results
  1. 21

    Decentralized trust framework for smart cities: a blockchain-enabled cybersecurity and data integrity model by Rafiqul Islam, Rajesh Bose, Sandip Roy, Arfat Ahmad Khan, Shrabani Sutradhar, Sujan Das, Farman Ali, Ahmad Ali AlZubi

    Published 2025-07-01
    “…The framework integrates three key layers: a Blockchain Layer for decentralized trust and immutability, a Cybersecurity Layer employing cryptographic standards and AI-based anomaly detection, and a Data Integrity Protocol Layer for real-time synchronization and tamper-proof data validation. …”
    Get full text
    Article
  2. 22

    Region-Based Hybrid Medical Image Watermarking Scheme for Robust and Secured Transmission in IoMT by Priyanka Singh, K. Jyothsna Devi, Hiren Kumar Thakkar, Ketan Kotecha

    Published 2022-01-01
    “…To ascertain integrity of RoI, tamper detection and recovery bits are embedded in RoI in the medical image. …”
    Get full text
    Article
  3. 23

    HalalChain: A decentralized blockchain model for enhanced data integrity, real-time compliance, and automated verification in halal food supply chain by Muhammad Muntasir Yakubu, Mohd Fadzil B Hassan, Kamaluddeen Usman Danyaro, Bello Musa Yakubu, Abdullah Abdulrahman Alabdulatif, S. Zulaikha Beevi, Aliyu Garba

    Published 2025-09-01
    “…Experimental evaluations demonstrate HalalChain’s superiority over existing models (AgriFoodCredChain, AgriBlockIoT), achieving a 99.8 % tamper detection rate, transaction throughput (38 TPS), consensus times of 1.2–2.5 s, 98 % validator approval rate, and optimal compliance adherence under varying loads. …”
    Get full text
    Article
  4. 24

    Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks by Shayla Islam, S.M. Topazal, Mohammad Kamrul Hasan, Raenu AL Kolandaisamy, Huda Saleh Abbas, Nguyen Vo, Rahul Thakkar, Muhammad Attique Khan, Deepak Gupta, Dina Abdulaziz AlHammadi

    Published 2025-09-01
    “…Meanwhile, blockchain-based authentication ensures tamper-proof and decentralized security, reducing vulnerability to cyberattacks by 90 % compared to traditional methods. …”
    Get full text
    Article
  5. 25

    Quantum secured blockchain framework for enhancing post quantum data security by Nalavala Ramanjaneya Reddy, Supriya Suryadevara, K. Guru Raghavendra Reddy, Ramisetty Umamaheswari, Ramakrishna Guttula, Rajitha Kotoju

    Published 2025-08-01
    “…QKD: The system supports tamper-proof key exchange, quantum-resilient consensus among validator nodes, and secure transaction signing. …”
    Get full text
    Article
  6. 26

    Enhancing Byzantine robustness of federated learning via tripartite adaptive authentication by Xiaomeng Li, Yanjun Li, Hui Wan, Cong Wang

    Published 2025-05-01
    “…However, frequent communication between the server and clients also provides opportunities for attackers to intercept or tamper with parameters, thereby affecting the global model’s performance. …”
    Get full text
    Article
  7. 27

    Hybrid Domain Perception Combined With Multi-expert Decoding to Improve Image Forgery Localization by Xuchao Gong, Hongjie Duan, Peiying Zhang, Jian Wang, Kai Liu, Zhaohui Li

    Published 2025-07-01
    “…This strategy adapts to the multi-dimensional distribution characteristics of the original data, enhancing the discrimination of tampered regions. Next, we employ a hybrid expert modeling approach to improve the model’s robustness in the representation space through feature selection and recombination. …”
    Get full text
    Article
  8. 28
  9. 29

    Blockchain-Driven Supply Chain’s Financing and Coordination Strategy under Nash Bargaining Scheme by Dan Tang

    Published 2023-01-01
    “…Compared with the traditional SCF mode, blockchain-driven SCF can shorten the transaction process and provide real trade data that cannot be tampered with, thereby improving the efficiency of capital operation. …”
    Get full text
    Article
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38

    Secure and Transparent Space Exploration Data Management Using a Hybrid Blockchain Model by Jaehyun Kim, Miguel Cartagena, Sunghwan Kim

    Published 2025-05-01
    “…Results show that it effectively detects data tampering, enforces access control, and synchronizes records with low latency. …”
    Get full text
    Article
  19. 39
  20. 40

    ESTIMATION TRACE OF HEROIN EXTRACTED FROM TOXIC PLANTS USING MOLECULARLY PRECIPITATION POLYMERS TECHNOLOGY by Y. K. Al-Bay, N. R. Jber, S. F. Abdullah

    Published 2025-08-01
    “…In human urine samples that were tampered with, the relative recoveries for heroin range from 92.5 to 103.75%. …”
    Get full text
    Article