Academic literature on the topic 'Remote data integrity checking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Remote data integrity checking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Remote data integrity checking"
Mohamed Sheriff S, R. "Integrating RSA Encryption in Remote Data Integrity Checking." International Journal of Science and Research (IJSR) 13, no. 4 (2024): 800–804. http://dx.doi.org/10.21275/mr24405171146.
Full textA., Nagesh, and Qurratul Ain Javeria. "Remote Data Integrity Check." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 661–64. https://doi.org/10.35940/ijeat.E9780.069520.
Full textB P,Sadhana, Sunil. "Remote Data Integrity Checking in Cloud Storage." International Journal of Advances in Scientific Research and Engineering 4, no. 7 (2018): 40–43. http://dx.doi.org/10.31695/ijasre.2018.32789.
Full textFan, X., G. Yang, Y. Mu, and Y. Yu. "On Indistinguishability in Remote Data Integrity Checking." Computer Journal 58, no. 4 (2013): 823–30. http://dx.doi.org/10.1093/comjnl/bxt137.
Full textChen, Bo, and Reza Curtmola. "Remote data integrity checking with server-side repair1." Journal of Computer Security 25, no. 6 (2017): 537–84. http://dx.doi.org/10.3233/jcs-16868.
Full textKulkarni, Neha Narayan, and Shitalkumar A. Jain. "Checking integrity of data and recovery in the cloud environment." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 2 (2019): 626–33. https://doi.org/10.11591/ijeecs.v13.i2.pp626-633.
Full textN. Saranya, N. Saranya, and Dr V. Thiagarasu Dr.V.Thiagarasu. "A Quasigroup Encryption Based Remote Data Integrity Checking Protocol for Secured Online Storage Services." International Journal of Scientific Research 2, no. 2 (2012): 55–57. http://dx.doi.org/10.15373/22778179/feb2013/22.
Full textWu, Tong, Guomin Yang, Yi Mu, Rongmao Chen, and Shengmin Xu. "Privacy-enhanced remote data integrity checking with updatable timestamp." Information Sciences 527 (July 2020): 210–26. http://dx.doi.org/10.1016/j.ins.2020.03.057.
Full textUshamani, G. D* Dr Y.C Kiran. "SECURE AND EFFICIENT DATA INTEGRITY PROOF AND RECOVERING DATA FOR IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING IN CLOUD COMPUTING (IB-PODUC)." Global Journal of Engineering Science and Research Management 4, no. 5 (2017): 51–57. https://doi.org/10.5281/zenodo.573506.
Full textB.V.Satya Vara Prasad, B., Ch Hari Kishan, S. P. Praveen, and Ch Mani Teja. "Identity-Based Data integrity checking in public cloud with bilinear pairings." International Journal of Engineering & Technology 7, no. 2.7 (2018): 209. http://dx.doi.org/10.14419/ijet.v7i2.7.10294.
Full textDissertations / Theses on the topic "Remote data integrity checking"
Mandadi, Harsha. "Remote Integrity Checking using Multiple PUF based Component Identifiers." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78200.
Full textClarke, Dwaine E. (Dwaine Errol) 1976. "Towards constant bandwidth overhead integrity checking of untrusted data." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33936.
Full textWonjiga, Amir Teshome. "User-centric security monitoring in cloud environments." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S080.
Full textJenkins, William George. "Real-time vehicle performance monitoring with data integrity." Master's thesis, Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.
Full textYoung, Steven D. "On The Development Of In-Flight Autonomous Integrity Monitoring Of Stored Geo-Spatial Data Using Forward-Looking Remote Sensing Technology." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113854420.
Full textHung, Shih-Cheng, and 洪士城. "An Intelligent Data Integrity Checking Mechanism for Developing E-Commerce Agents." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/70409966670613927500.
Full textChen, Jia-Ling, and 陳佳伶. "A Mechanism for Data Integrity Checking with Selective Capability and Its Application to Auditing Securities Transaction Databases." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/96568550818222764090.
Full textLopes, José Pedro Silva. "Ontology-driven metamodeling towards hypervisor design automation: runtime security and data integrity." Master's thesis, 2017. http://hdl.handle.net/1822/59264.
Full textBooks on the topic "Remote data integrity checking"
Devmane, Vidyullata Sawant. Integrity Checking Techniques to Secure Data in Cloud. Blurb, 2021.
Find full textBook chapters on the topic "Remote data integrity checking"
Wang, Huaqun, and Jiguo Li. "Private Certificate-Based Remote Data Integrity Checking in Public Clouds." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21398-9_45.
Full textZhang, Yongchun, Yingpeng Sang, Zhicheng Xi, and Hanrui Zhong. "Lattice Based Multi-replica Remote Data Integrity Checking for Data Storage on Cloud." In Parallel Architectures, Algorithms and Programming. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2767-8_39.
Full textAshok Reddy, P., K. Nagaraju, K. Kalyani, M. Lakshmipathi, and V. Lakshmi Prasanna. "Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor." In Advances in Intelligent Systems and Computing. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7330-6_38.
Full textPragathy, V. Y., and L. Yamuna Devi. "Enhanced Dynamic Remote Data Possession Checking Protocol with Unlimited Number of Verifications and Public Verifiability for Ensuring Cloud Data Integrity." In Advances in Data-Driven Computing and Intelligent Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9531-8_15.
Full textZeng, Ke. "Publicly Verifiable Remote Data Integrity." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_28.
Full textFeng, Yiteng, Yi Mu, Guomin Yang, and Joseph K. Liu. "A New Public Remote Integrity Checking Scheme with User Privacy." In Information Security and Privacy. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7_22.
Full textZhou, Rui, Zhu Ai, Jun Hu, et al. "Data Integrity Checking for iSCSI with Dm-verity." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-7262-5_79.
Full textYang, Changsong, Xiaoling Tao, Sufang Wang, and Feng Zhao. "Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage." In Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59016-1_51.
Full textLiu, Hongyu, Leiting Chen, and Liyao Zeng. "Cloud Data Integrity Checking with Deduplication for Confidential Data Storage." In Cyberspace Safety and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69471-9_34.
Full textYang, Jun, and Shujuan Li. "Searchable Public Key Encryption Scheme with Data Integrity Checking." In Advances on Broad-Band Wireless Computing, Communication and Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49106-6_34.
Full textConference papers on the topic "Remote data integrity checking"
Sunkireddy, Sravanthi, and Ayad Barsoum. "Remote Data Integrity for Cloud Based Storage System." In SSPC 2016 Greencoat. SSPC, 2016. https://doi.org/10.5006/s2016-00068.
Full textChowdary, N. Sampreeth, Shashank Kadiyala, V. Esther Jyothi, P. Srinandan, S. Phani Praveen, and P. Bhanu Prakash. "Identity and Proxy Orientation Based Remote Data Integration Checking and Uploading in Public Clouds." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064101.
Full textFloria, Robert, and Alfonso Garcia. "Aggregating and Standardizing Disjointed Integrity Management Data." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17646.
Full textHeld, Craig. "Implementing Remote Wireless Monitoring of Pipeline Integrity and Cathodic Protection." In CORROSION 2010. NACE International, 2010. https://doi.org/10.5006/c2010-10028.
Full textda Costa, Tony, and Matt Barrett. "Improving Cathodic Protection Monitoring Data in the Time of IIoT and Big Data." In CORROSION 2021. AMPP, 2021. https://doi.org/10.5006/c2021-16259.
Full textSharma, Prafull, Freddie Talbot, and Phil Yule. "Corrosion Under Insulation (CUI) Remote Monitoring - Case Study and Experiences from Saudi Arabia." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00282.
Full textHill, D., S. Marion, F. Ayello, L. Cunci, and N. Sridhar. "Use of Sensor Systems for Remote Monitoring of Corrosion and Structural Health: Case Studies." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09457.
Full textStubelj, Ivan Ruiz, Heitor Ruschmann, Kjell Wold, and Jan Olaf Gomnaes. "Pipeline Predictive Analitics Trough On-Line Remote Corrosion Monitoring." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-12899.
Full textJenkins, Walt. "A Database and Query System for Refinery Vessels." In CORROSION 1994. NACE International, 1994. https://doi.org/10.5006/c1994-94524.
Full textJuzga, Giovanni A., and William L. Garcia. "SIGCO (Corrosion Management Information System): Platform for Managing Corrosion Processes and Integrity in Oilfield Facilities." In LatinCORR 2023. AMPP, 2023. https://doi.org/10.5006/lac23-20553.
Full textReports on the topic "Remote data integrity checking"
Derby, Martin, and Mark Saunders. PR635-203904-R01 In-situ Instrumentation and Remote Sensing Methods for Slope Monitoring for Pipelines. Pipeline Research Council International, Inc. (PRCI), 2022. http://dx.doi.org/10.55274/r0012207.
Full textYoel, David, Tina Sicilia, Matthew Bogaart, and Jeremy Fernandes. PR-417-203902-R01 Remote Sensing and Leak Detection Platform That Can Deploy Multiple Sensor Types. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000052.
Full textPerez-Vincent, Santiago M., Verónica Abril, Cynthia Chen, Teniola Tayo, and Andres Urrego Jimenez. Crime Underreporting in Latin America and the Caribbean. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013215.
Full textGalili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs, and Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, 1994. http://dx.doi.org/10.32747/1994.7570549.bard.
Full text