Mostrando 821 - 840 Resultados de 2,862 Para Buscar '"data integrity"', tiempo de consulta: 0.38s Limitar resultados
  1. 821
    “…The proposed design introduces a novel approach to safeguarding sensitive information and ensuring data integrity while maintaining a high level of trust among stakeholders. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 822
    “…Blockchain technology offers great value in terms of decentralization, data integrity, transparency, and traceability, however the transactional data is public, and accessible raising concerns about violating privacy regulations. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 823
    “…Additional awareness of the need for data integrity of sequences submitted to public databases is needed to fully reap the benefits of these large data sets.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 824
    “…PURPOSE: Given the extensive data stored in healthcare data warehouses, data warehouse governance policies are needed to ensure data integrity and privacy. This review examines the current state of the data warehouse governance literature as it applies to healthcare data warehouses, identifies knowledge gaps, provides recommendations, and suggests approaches for further research. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 825
    “…Conclusions: QA programs are critical for ensuring data integrity and therefore for the conduct of multicenter clinical trials.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 826
    “…The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 827
    “…Finally, the Lundman and Grenheim method was used to analyze the interviews and the four criteria of Guba and Lincoln were applied to check data integrity. Results: "Buying time," "methadone dependence," and "looking from a narrow view to the patient" were the main three categories that fit the results. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 828
    por Konan, Martin, Wang, Wenyong
    Publicado 2019
    “…Therefore, several schemes have been proposed to guarantee data integrity and privacy during their transmission between the client/controller (C) and the AP. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 829
    “…Deep semistructured interviews were performed to gather data, and triangulation and member checking were utilized to ensure data integrity. The data were analyzed using Colaizzite seven-stage method. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 830
    “…It also shows the suitability of the proposed hash functions for the application such as Message Authentication, Data Integrity, Digital Signature, and Authenticated Encryption with Associated Data.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 831
    “…Finally, this SLR concludes that the upcoming research can support the pervasive implementation of BCT to address the critical dilemmas related to health diagnostics, enhancing the patient healthcare process in remote monitoring or emergencies, data integrity, and avoiding fraud.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 832
    “…One is based on cryptography and relies on computational complexity, the other is based on physical layer fingerprint and can not protect data integrity well. Both of these approaches will become insecure when facing attackers with infinite computing power. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 833
    “…The recent advent of the dynamic consent concept intensified the data integrity issue in clinical trials. Incorporating blockchain technology into a dynamic consent platform can be a feasible solution. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 834
    “…In emergent technologies, data integrity is critical for message-passing communications, where security measures and validations must be considered to prevent the entrance of invalid data, detect errors in transmissions, and prevent data loss. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 835
    “…Our framework also helps to check data integrity and consistency and data comparisons across species. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 836
    “…As a result of all these concerns, this study emphasizes the need for COVID-19 data processing to acquire aspects such as data security, data integrity, real-time data handling, and data management to provide patients with all benefits from which they had been denied owing to misinformation. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  17. 837
    “…However, public transport datasets suffer from data integrity problems; boarding stop information may be missing due to imperfect acquirement processes or inadequate reporting. …”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 838
    “…Two-party collaborative signature scheme is an important cryptographic technology for user authentication and data integrity protection when using mobile devices for financial and securities transactions. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 839
    “…DESIGN: Using published FDA guidance and prior literature, we created a structure for virtual site visits that prioritized monitoring for protocol compliance, safety, and data integrity. We conducted site visits in three stages: preparation for the visit, the virtual meeting itself, and follow-up. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 840
    por Leaver, James D G
    Publicado 2006
    “…A FED Tester card has also been produced to enable testing of the FED under realistic CMS conditions. The data integrity of the S-Link connection used to read out the FED has been assessed and an extensive suite of software has been written to verify the performance of the FED hardware and firmware. …”
    Enlace del recurso
Herramientas de búsqueda: RSS