Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-09482-5
Abstract: Due to the massive popularity and consciousness towards requirements in evidence, the usage of the surveillance system has tremendously increased. Although video data recorded by the surveillance system contains important information and provides crucial evidence,…
read more here.
Keywords:
video;
system;
surveillance;
method ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Wuhan University Journal of Natural Sciences"
DOI: 10.1007/s11859-019-1379-5
Abstract: Python is widely used in web crawler, machine learning, data analysis and so on. However, there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity. When the system…
read more here.
Keywords:
integrity;
vulnerability detection;
integrity verification;
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2924486
Abstract: The Internet of Things (IoT) is also known as the Internet of everything. As an important part of the new generation of intelligent information technology, the IoT has attracted the attention both of researchers and…
read more here.
Keywords:
integrity verification;
signature;
data integrity;
iot ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3211391
Abstract: The cloud storage service provides the storage and access function for massive data, reducing the management cost for large amounts of data. The data integrity verification scheme in cloud storage can be employed to help…
read more here.
Keywords:
integrity verification;
cloud storage;
data integrity;
verification ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2020.3015925
Abstract: Emerging nonvolatile memories (NVMs), while exhibiting great potential to be DRAM alternatives, are vulnerable to security attacks. Secure NVM designs demand data persistence on top of traditional confidentiality and integrity protection. A simple adaption of…
read more here.
Keywords:
secure;
verification overhead;
integrity verification;
nonvolatile memories ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2019.2942297
Abstract: Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A…
read more here.
Keywords:
integrity verification;
cloud storage;
post quantum;
identity based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v14.i3.pp1425-1432
Abstract: Integrity and data privacy are the main security parameters between the vehicle and roadside unit (RSU) over large VANETs. The integrity of the vehicle is used to check its identity against the neighboring nodes, whereas…
read more here.
Keywords:
vehicle;
integrity verification;
model;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of Internet Technology"
DOI: 10.53106/160792642021092205004
Abstract: The blockchain is getting increasingly popular nowadays because of its decentralization and distributed consistency. The backbone protocol of blockchain is the consensus protocol, making it execute stably. The commonly used consensus protocols in blockchain, such as Proof of Work…
read more here.
Keywords:
consensus;
storage age;
protocol;
integrity verification ... See more keywords