Results 21 to 30 of about 2,828,600 (279)

Letter from the Editor

open access: yesBlockchain in Healthcare Today, 2018
No abstract available.
John David Halamka
doaj   +1 more source

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

Cloud storage data integrity audit based on an index–stub table

open access: yes工程科学学报, 2020
With the development of cloud computing technology, more individuals and organizations have chosen cloud services to store and maintain their data and reduce the burden on local storage and corresponding maintenance costs.
Hai-chun ZHAO   +2 more
doaj   +1 more source

Ensuring Long-Term Data Integrity [PDF]

open access: yes, 2016
The European Train Control System (ETCS) is the leading signaling system for train command and control. In the future, ETCS may be delivered over long-term evolution (LTE) networks.
Berbineau, Marion   +3 more
core   +2 more sources

HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS

open access: yesСистемный анализ и прикладная информатика, 2017
A new hashing algorithm based on dynamic chaos is proposed. Owing to the use of chaotic mappings, this algorithm is irreversible and a search for two messages with identical hash-values becomes computationally difficult.
A. V. Sidorenko, I. V. Shakinko
doaj   +1 more source

Privacy Architectures: Reasoning About Data Minimisation and Integrity [PDF]

open access: yes, 2014
Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task.
C. Diaz   +20 more
core   +4 more sources

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

Chronic Post-Concussion Neurocognitive Deficits. I. Relationship with White Matter Integrity. [PDF]

open access: yes, 2016
We previously identified visual tracking deficits and associated degradation of integrity in specific white matter tracts as characteristics of concussion.
Eva M Palacios   +5 more
core   +3 more sources

Key Issues in Healthcare Data Integrity: Analysis and Recommendations

open access: yesIEEE Access, 2020
Managing data integrity is a challenging task for any expert or a researcher. This study attempts to collate a Systematic Literature Review of the research efforts done in the domain of healthcare data integrity.
Abhishek Kumar Pandey   +6 more
doaj   +1 more source

Data reduction algorithm for correlated data in the smart grid

open access: yesIET Smart Grid, 2021
Smart grids are intelligent electrical networks that incorporate information and communication technology (ICT) to provide data services for the power grid.
Zoya Pourmirza, Sara Walker, John Brooke
doaj   +1 more source

Home - About - Disclaimer - Privacy