Showing 91 - 100 of 3,289
Purpose – The purpose of this paper is to understand the factors that influence attitudes toward counterfeits, and the … considerable percentage of the variance of intention to purchase counterfeits. Beliefs explain attitude to a large extent. Research … counterfeits, even in a religious environment and do not perceive prosecution risks. Government enforcement is important to alter …
Persistent link: https://www.econbiz.de/10014714806
both original luxury brands and their counterfeits transfer the symbolic personality traits of the original brand to the … experience a stronger overlap between their overall self-concept and the original brand’s concept than with the counterfeit’s … concept, and feel higher levels of love toward the original brands than toward their counterfeits. Practical implications …
Persistent link: https://www.econbiz.de/10015012138
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement … scheme provides the amenity of mutual authentication and session key agreement safely. The informal security verification has …
Persistent link: https://www.econbiz.de/10012043263
through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the … authentication process, which are of major concern for real-time applications and media streaming application. In the same way, it is … traditional authentication mechanisms frequently adopted the names and passwords of clients as login authentication. However …
Persistent link: https://www.econbiz.de/10012043265
In remote user authentication, a server confirms the authenticity of a user via unreliable channel. Several … authentication protocols are devised in the literature relied on the identity, password and biometric of a user. But, most of the … authentication protocols are either computationally expensive or not-secure from several kinds of malicious threats. In this document …
Persistent link: https://www.econbiz.de/10012043272
Recently, Om et al. proposed three-factor remote user authentication protocol using ElGamal cryptosystem and ensured … robust anonymous identity based authentication scheme for multi-server environment. The authentication proof of the proposed … scheme has validated using BAN (Burrows-Abadi-Needham) logic, which confirms the protocol facilitates mutual authentication …
Persistent link: https://www.econbiz.de/10012043273
The session initiation protocol is one the most popular protocols that is used in Internet protocol multimedia subsystems and adopted by a wide range of networking vendors. This research suggests a secure distributed session initiation protocol-based architectural model that can be deployed in...
Persistent link: https://www.econbiz.de/10012043352
problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a …
Persistent link: https://www.econbiz.de/10012043376
authentication watermark for each group, embed the watermark using the improved reversible data hiding approach, and hide the mark of …
Persistent link: https://www.econbiz.de/10012043915