Results 11 to 20 of about 2,872,014 (281)
Various components are involved in the end-to-end path of data transfer. Protecting data integrity from failures in these intermediate components is a key feature of big data transfer tools.
Preethika Kasu +2 more
doaj +1 more source
Secure agent data integrity shield [PDF]
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius +15 more
core +1 more source
A Survey of Blockchain for Video Integrity
Blockchain has become an important alternative in plenty of industries due to its features such as traceability, transparency and data integrity. Blockchain is not only present in the management of structured data-like names, timestamps, addresses and so
Jorge Ceron +2 more
doaj +1 more source
Monitoring Data Integrity in Big Data Analytics Services [PDF]
Enabled by advances in Cloud technologies, Big Data Analytics Services (BDAS) can improve many processes and identify extra information from previously untapped data sources. As our experience with BDAS and its benefits grows and technology for obtaining
Kloukinas, C. +2 more
core +1 more source
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the tag ...
Georgios M. Nikolopoulos, Marc Fischlin
doaj +1 more source
Privacy-Preserving Traffic Management: A Blockchain and Zero-Knowledge Proof Inspired Approach
Incorporation of connected vehicle (CV) data into real-time traffic management systems presents a host of new challenges resulting from the current lack of data integrity and data privacy in traffic networks.
Wanxin Li +3 more
doaj +1 more source
A revival of integrity constraints for data cleaning [PDF]
Integrity constraints, a.k.a . data dependencies, are being widely used for improving the quality of schema .
Fan, Wenfei, Geerts, Floris, Jia, Xibei
core +1 more source
Integrity static analysis of COTS/SOUP [PDF]
This paper describes the integrity static analysis approach developed to support the justification of commercial off-the-shelf software (COTS) used in a safety-related system.
Bishop, P. G. +4 more
core +1 more source
Cloud storage data integrity audit based on an index–stub table
With the development of cloud computing technology, more individuals and organizations have chosen cloud services to store and maintain their data and reduce the burden on local storage and corresponding maintenance costs.
Hai-chun ZHAO +2 more
doaj +1 more source

