Articles with "integrity verification" as a keyword



Photo from wikipedia

A data integrity verification method for surveillance video system

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-09482-5

Abstract: Due to the massive popularity and consciousness towards requirements in evidence, the usage of the surveillance system has tremendously increased. Although video data recorded by the surveillance system contains important information and provides crucial evidence,… read more here.

Keywords: video; system; surveillance; method ... See more keywords
Photo by ricbro from unsplash

A Python Security Analysis Framework in Integrity Verification and Vulnerability Detection

Sign Up to like & get
recommendations!
Published in 2019 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-019-1379-5

Abstract: Python is widely used in web crawler, machine learning, data analysis and so on. However, there is no guarantee that Python scripts are trusted in their whole lifetime because of system insecurity. When the system… read more here.

Keywords: integrity; vulnerability detection; integrity verification;
Photo by campaign_creators from unsplash

A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2924486

Abstract: The Internet of Things (IoT) is also known as the Internet of everything. As an important part of the new generation of intelligent information technology, the IoT has attracted the attention both of researchers and… read more here.

Keywords: integrity verification; signature; data integrity; iot ... See more keywords
Photo by lukaszlada from unsplash

A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3211391

Abstract: The cloud storage service provides the storage and access function for massive data, reducing the management cost for large amounts of data. The data integrity verification scheme in cloud storage can be employed to help… read more here.

Keywords: integrity verification; cloud storage; data integrity; verification ... See more keywords
Photo from wikipedia

CacheTree: Reducing Integrity Verification Overhead of Secure Nonvolatile Memories

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2020.3015925

Abstract: Emerging nonvolatile memories (NVMs), while exhibiting great potential to be DRAM alternatives, are vulnerable to security attacks. Secure NVM designs demand data persistence on top of traditional confidentiality and integrity protection. A simple adaption of… read more here.

Keywords: secure; verification overhead; integrity verification; nonvolatile memories ... See more keywords
Photo from wikipedia

DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2019.2942297

Abstract: Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A… read more here.

Keywords: integrity verification; cloud storage; post quantum; identity based ... See more keywords
Photo from wikipedia

A chaotic based integrity verification and encryption model for real-time VANET

Sign Up to like & get
recommendations!
Published in 2019 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v14.i3.pp1425-1432

Abstract: Integrity and data privacy are the main security parameters between the vehicle and roadside unit (RSU) over large VANETs.  The integrity of the vehicle is used to check its identity against the neighboring nodes, whereas… read more here.

Keywords: vehicle; integrity verification; model; security ... See more keywords
Photo by philinit from unsplash

PoSI: A New Consensus Protocol Based on Storage Age and Data Integrity Verification

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Internet Technology"

DOI: 10.53106/160792642021092205004

Abstract: The blockchain is getting increasingly popular nowadays because of its decentralization and distributed consistency. The backbone protocol of blockchain is the consensus protocol, making it execute stably. The commonly used consensus protocols in blockchain, such as Proof of Work… read more here.

Keywords: consensus; storage age; protocol; integrity verification ... See more keywords