Search Results

There are 9904 results for: content related to: Prescription Opioid Forgery: Reporting to Law Enforcement and Protection of Medical Information

  1. Forgery and Appropriation in Art

    Philosophy Compass

    Volume 5, Issue 12, December 2010, Pages: 1047–1056, Darren Hudson Hick

    Version of Record online : 1 DEC 2010, DOI: 10.1111/j.1747-9991.2010.00353.x

  2. Romanticism and Forgery

    Literature Compass

    Volume 4, Issue 6, November 2007, Pages: 1625–1649, Nick Groom

    Version of Record online : 14 AUG 2007, DOI: 10.1111/j.1741-4113.2007.00485.x

  3. Fakes on Display: Special Exhibitions of Counterfeit Art

    Curator: The Museum Journal

    Volume 58, Issue 3, July 2015, Pages: 335–350, William Casement

    Version of Record online : 30 JUL 2015, DOI: 10.1111/cura.12117

  4. Australia’s Plastic Banknotes: Fighting Counterfeit Currency

    Angewandte Chemie International Edition

    Volume 49, Issue 22, May 17, 2010, Pages: 3726–3736, Emma L. Prime and David H. Solomon

    Version of Record online : 31 MAR 2010, DOI: 10.1002/anie.200904538

  5. Blind Detection of Region Duplication Forgery Using Fractal Coding and Feature Matching

    Journal of Forensic Sciences

    Volume 61, Issue 3, May 2016, Pages: 623–636, Mohsen Jenadeleh and Mohsen Ebrahimi Moghaddam

    Version of Record online : 8 APR 2016, DOI: 10.1111/1556-4029.13108

  6. Parallelizable MAC revisited

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1115–1127, Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng and Matt Henricksen

    Version of Record online : 10 JUL 2013, DOI: 10.1002/sec.842

  7. Security analysis of GCM for communication

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 854–864, Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng and Matt Henricksen

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.798

  8. The Forger's Art: Forgery and the Philosophy of Art

    Philosophical Books

    Volume 26, Issue 3, July 1985, Pages: 168–171, F. N. SIBLEY

    Version of Record online : 12 FEB 2009, DOI: 10.1111/j.1468-0149.1985.tb01455.x

  9. Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images

    Journal of Forensic Sciences

    Mahmoud Emam, Qi Han and Hongli Zhang

    Version of Record online : 2 MAR 2017, DOI: 10.1111/1556-4029.13456

  10. Efficient signcryption in the standard model

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 17, 10 December 2012, Pages: 1977–1989, Fagen Li, Mingwu Zhang and Tsuyoshi Takagi

    Version of Record online : 22 SEP 2011, DOI: 10.1002/cpe.1823

  11. Authenticated encryption: how reordering can impact performance

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6173–6188, Basel Alomair

    Version of Record online : 15 FEB 2017, DOI: 10.1002/sec.1764

  12. Forgery

    Standard Article

    The Encyclopedia of Crime and Punishment

    Adam Ghazi-Tehrani, Bryan Burton and Henry N. Pontell

    Published Online : 28 DEC 2015, DOI: 10.1002/9781118519639.wbecpx020

  13. Score level fusion approach in dynamic signature verification based on hybrid wavelet-Fourier transform

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1067–1078, Wee How Khoh, Thian Song Ong, Ying Han Pang and Andrew Beng Jin Teoh

    Version of Record online : 2 JUL 2013, DOI: 10.1002/sec.829

  14. Authorship verification using deep belief network systems

    International Journal of Communication Systems

    Volume 30, Issue 12, August 2017, Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang and Mohammad S. Obaidat

    Version of Record online : 18 JAN 2017, DOI: 10.1002/dac.3259

  15. Video inter-frame forgery identification based on the consistency of quotient of MSSIM

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4548–4556, Zhaohong Li, Zhenzhen Zhang, Sheng Guo and Jinwei Wang

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1648

  16. You have full text access to this OnlineOpen article
    Interventions to reduce corruption in the health sector

    Intervention Review

    The Cochrane Library

    Rakhal Gaitonde, Andrew D Oxman, Peter O Okebukola and Gabriel Rada

    Published Online : 16 AUG 2016, DOI: 10.1002/14651858.CD008856.pub2

  17. A new security model to prevent denial-of-service attacks and violation of availability in wireless networks

    International Journal of Communication Systems

    Volume 25, Issue 7, July 2012, Pages: 903–925, Mina Malekzadeh, Abdul Azim Abdul Ghani and Shamala Subramaniam

    Version of Record online : 19 JUL 2011, DOI: 10.1002/dac.1296

  18. Signcryption KEM/tag-KEM, revisited

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3067–3082, Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Yuan Zhou

    Version of Record online : 25 MAR 2015, DOI: 10.1002/sec.1232

  19. Efficient multiple sources network coding signature in the standard model

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 10, July 2015, Pages: 2616–2636, Jinlin Zhang, Jun Shao, Yun Ling, Min Ji, Guiyi Wei and Bishan Ying

    Version of Record online : 25 JUL 2014, DOI: 10.1002/cpe.3322

  20. Currency from Opinion: Imitation Banknotes and the Materiality of Paper Currency in Britain, 1782–1847

    Art History

    Volume 40, Issue 1, February 2017, Pages: 104–131, Amanda Lahikainen

    Version of Record online : 22 JUN 2016, DOI: 10.1111/1467-8365.12228