Results 21 to 30 of about 2,872,014 (281)

HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS

open access: yesСистемный анализ и прикладная информатика, 2017
A new hashing algorithm based on dynamic chaos is proposed. Owing to the use of chaotic mappings, this algorithm is irreversible and a search for two messages with identical hash-values becomes computationally difficult.
A. V. Sidorenko, I. V. Shakinko
doaj   +1 more source

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification [PDF]

open access: yes, 2014
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing.
Keoh, Sye Loong, Tang, Zhaohui
core   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

Key Issues in Healthcare Data Integrity: Analysis and Recommendations

open access: yesIEEE Access, 2020
Managing data integrity is a challenging task for any expert or a researcher. This study attempts to collate a Systematic Literature Review of the research efforts done in the domain of healthcare data integrity.
Abhishek Kumar Pandey   +6 more
doaj   +1 more source

Data reduction algorithm for correlated data in the smart grid

open access: yesIET Smart Grid, 2021
Smart grids are intelligent electrical networks that incorporate information and communication technology (ICT) to provide data services for the power grid.
Zoya Pourmirza, Sara Walker, John Brooke
doaj   +1 more source

Chronic Post-Concussion Neurocognitive Deficits. I. Relationship with White Matter Integrity. [PDF]

open access: yes, 2016
We previously identified visual tracking deficits and associated degradation of integrity in specific white matter tracts as characteristics of concussion.
Eva M Palacios   +5 more
core   +3 more sources

Unsupervised Learning-Based Plant Pipeline Leak Detection Using Frequency Spectrum Feature Extraction and Transfer Learning

open access: yesIEEE Access
The deterioration of power generation facilities built during the early stages of plant operation is becoming increasingly severe, raising concerns about potential socioeconomic harm from pipe leaks.
Sujin Park, Doyeob Yeo, Ji-Hoon Bae
doaj   +1 more source

A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology

open access: yesIEEE Access, 2020
Nuclear Power Plants (NPPs) are physically isolated from external networks and have different operational environments than conventional information technology (IT) systems. Accordingly, NPPs were regarded as safe from external cyber-attacks. However, it
Moon Kyoung Choi   +2 more
doaj   +1 more source

Ensuring Long-Term Data Integrity [PDF]

open access: yes, 2016
The European Train Control System (ETCS) is the leading signaling system for train command and control. In the future, ETCS may be delivered over long-term evolution (LTE) networks.
Berbineau, Marion   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy