Mostrando 761 - 780 Resultados de 2,862 Para Buscar '"data integrity"', tiempo de consulta: 0.35s Limitar resultados
  1. 761
    “…The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 762
    “…This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 763
    por Shin, Insun, Koo, Kyoungmin, Kwon, Daeil
    Publicado 2018
    “…Bit error rate (BER), which represents data integrity during digital signal transmission, was selected to sense interconnect health without connecting external sensing devices. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 764
    “…However, because of few the cells in memory that have lower retention time, DRAM has to raise the refresh frequency to keep the data integrity, and hence produce unnecessary refreshes for the other normal cells, which results in a large refresh energy and performance delay of memory access. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 765
    “…As a main distinction, the platform incorporates a novel certificateless cryptographic scheme for ensuring data integrity and nodes’ authentication, suitable for VANETs lacking of infrastructure.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 766
    “…The proposed methodology helps to protect data integrity and availability based on the security advantages provided by blockchain and the use of cryptographic tools. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 767
    “…Data Integrity Auditing (DIA) is a security service for checking the integrity of data stored in a PCS (Public Cloud Storage), a third-party based storage service. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 768
    “…We examined 68 removed articles and determined that many of the articles were removed for unknown reasons (n = 22) or as duplications (n = 12); 24 papers were retracted for more significant reasons (data integrity, plagiarism, reporting or analysis, and IRB or privacy issues). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 769
    por Sim, Sung-Ho, Jeong, Yoon-Su
    Publicado 2021
    “…In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 770
    “…A comparative analysis of the proposed framework with existing studies demonstrates that the synchronization of data between the DT and PA ensures data integrity for the Botnet detection model training. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 771
    “…As mobile agents work in an insecure environment, their security is a top priority when communicating and exchanging data and information. Data integrity, data confidentiality and authentication, on-repudiation, denial of service, and access control, are all key security concerns with mobile agent migration. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 772
    por Perone, Angela
    Publicado 2022
    “…Topics include: Capturing diverse perspectives in survey design (8 focus groups, N=35); addressing external threats to data integrity; implementing multiple types of outreach in phases to expand participant diversity; and working with the coalition and other partners through different stages of survey design, recruitment, data analysis, and identification/enactment of goals for change informed by data, while also navigating a pandemic.…”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 773
    “…Realizing the potential of user‐developed automation software interacting with a treatment planning system (TPS) requires rigorous testing to ensure patient safety and data integrity. We developed an automated test platform to allow comparison of the treatment planning database before and after the execution of a write‐enabled script interacting with a commercial TPS (Eclipse, Varian Medical Systems, Palo Alto, CA) using the vendor‐provided Eclipse Scripting Application Programming Interface (ESAPI). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 774
    “…These measures will result in reduced query generations and improved data integrity. It is recommended to establish and maintain a library of templates of standard CRF modules as they are time saving and cost-effective. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 775
    por Li, Ming, Wen, Yalu, Fu, Wenjiang
    Publicado 2015
    “…This method requires no between-array normalization, and thus, maintains data integrity and independence of samples among individual subjects. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 776
    “…The reason for the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third party organization in control of the transactions, and therefore it creates interesting research areas, especially from the perspective of technical challenges and limitations. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  17. 777
    “…The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 778
    “…Good Clinical Practice (GCP) guidance documents from the FDA provides principles and procedures designed to safeguard data integrity, reliability and reproducibility. While these documents maybe excessive for clinical studies not intended for regulatory oversight it is important to remember that research builds on research. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 779
    “…Cyber attacks on microbial NGS could result in loss of confidentiality (leakage of personal or institutional data), integrity (misdetection of pathogens) and availability (denial of sequencing services). …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 780
    “…The integration of blockchain and signature chain provides efficient management functions with valuable security properties for the logs, including robust identity verification, data integrity, non-repudiation, data tamper resistance, and the legality. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS