Gotowa bibliografia na temat „Remote data integrity checking”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Remote data integrity checking”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Remote data integrity checking"
Mohamed Sheriff S, R. "Integrating RSA Encryption in Remote Data Integrity Checking." International Journal of Science and Research (IJSR) 13, no. 4 (2024): 800–804. http://dx.doi.org/10.21275/mr24405171146.
Pełny tekst źródłaA., Nagesh, and Qurratul Ain Javeria. "Remote Data Integrity Check." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 661–64. https://doi.org/10.35940/ijeat.E9780.069520.
Pełny tekst źródłaB P,Sadhana, Sunil. "Remote Data Integrity Checking in Cloud Storage." International Journal of Advances in Scientific Research and Engineering 4, no. 7 (2018): 40–43. http://dx.doi.org/10.31695/ijasre.2018.32789.
Pełny tekst źródłaFan, X., G. Yang, Y. Mu, and Y. Yu. "On Indistinguishability in Remote Data Integrity Checking." Computer Journal 58, no. 4 (2013): 823–30. http://dx.doi.org/10.1093/comjnl/bxt137.
Pełny tekst źródłaChen, Bo, and Reza Curtmola. "Remote data integrity checking with server-side repair1." Journal of Computer Security 25, no. 6 (2017): 537–84. http://dx.doi.org/10.3233/jcs-16868.
Pełny tekst źródłaKulkarni, Neha Narayan, and Shitalkumar A. Jain. "Checking integrity of data and recovery in the cloud environment." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 2 (2019): 626–33. https://doi.org/10.11591/ijeecs.v13.i2.pp626-633.
Pełny tekst źródłaN. Saranya, N. Saranya, and Dr V. Thiagarasu Dr.V.Thiagarasu. "A Quasigroup Encryption Based Remote Data Integrity Checking Protocol for Secured Online Storage Services." International Journal of Scientific Research 2, no. 2 (2012): 55–57. http://dx.doi.org/10.15373/22778179/feb2013/22.
Pełny tekst źródłaWu, Tong, Guomin Yang, Yi Mu, Rongmao Chen, and Shengmin Xu. "Privacy-enhanced remote data integrity checking with updatable timestamp." Information Sciences 527 (July 2020): 210–26. http://dx.doi.org/10.1016/j.ins.2020.03.057.
Pełny tekst źródłaUshamani, G. D* Dr Y.C Kiran. "SECURE AND EFFICIENT DATA INTEGRITY PROOF AND RECOVERING DATA FOR IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING IN CLOUD COMPUTING (IB-PODUC)." Global Journal of Engineering Science and Research Management 4, no. 5 (2017): 51–57. https://doi.org/10.5281/zenodo.573506.
Pełny tekst źródłaB.V.Satya Vara Prasad, B., Ch Hari Kishan, S. P. Praveen, and Ch Mani Teja. "Identity-Based Data integrity checking in public cloud with bilinear pairings." International Journal of Engineering & Technology 7, no. 2.7 (2018): 209. http://dx.doi.org/10.14419/ijet.v7i2.7.10294.
Pełny tekst źródłaRozprawy doktorskie na temat "Remote data integrity checking"
Mandadi, Harsha. "Remote Integrity Checking using Multiple PUF based Component Identifiers." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78200.
Pełny tekst źródłaClarke, Dwaine E. (Dwaine Errol) 1976. "Towards constant bandwidth overhead integrity checking of untrusted data." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33936.
Pełny tekst źródłaWonjiga, Amir Teshome. "User-centric security monitoring in cloud environments." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S080.
Pełny tekst źródłaJenkins, William George. "Real-time vehicle performance monitoring with data integrity." Master's thesis, Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.
Pełny tekst źródłaYoung, Steven D. "On The Development Of In-Flight Autonomous Integrity Monitoring Of Stored Geo-Spatial Data Using Forward-Looking Remote Sensing Technology." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113854420.
Pełny tekst źródłaHung, Shih-Cheng, and 洪士城. "An Intelligent Data Integrity Checking Mechanism for Developing E-Commerce Agents." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/70409966670613927500.
Pełny tekst źródłaChen, Jia-Ling, and 陳佳伶. "A Mechanism for Data Integrity Checking with Selective Capability and Its Application to Auditing Securities Transaction Databases." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/96568550818222764090.
Pełny tekst źródłaLopes, José Pedro Silva. "Ontology-driven metamodeling towards hypervisor design automation: runtime security and data integrity." Master's thesis, 2017. http://hdl.handle.net/1822/59264.
Pełny tekst źródłaKsiążki na temat "Remote data integrity checking"
Devmane, Vidyullata Sawant. Integrity Checking Techniques to Secure Data in Cloud. Blurb, 2021.
Znajdź pełny tekst źródłaCzęści książek na temat "Remote data integrity checking"
Wang, Huaqun, and Jiguo Li. "Private Certificate-Based Remote Data Integrity Checking in Public Clouds." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21398-9_45.
Pełny tekst źródłaZhang, Yongchun, Yingpeng Sang, Zhicheng Xi, and Hanrui Zhong. "Lattice Based Multi-replica Remote Data Integrity Checking for Data Storage on Cloud." In Parallel Architectures, Algorithms and Programming. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2767-8_39.
Pełny tekst źródłaAshok Reddy, P., K. Nagaraju, K. Kalyani, M. Lakshmipathi, and V. Lakshmi Prasanna. "Identity-Based Remote Data Integrity Checking Using Lattice Approach by Third-Party Auditor." In Advances in Intelligent Systems and Computing. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7330-6_38.
Pełny tekst źródłaPragathy, V. Y., and L. Yamuna Devi. "Enhanced Dynamic Remote Data Possession Checking Protocol with Unlimited Number of Verifications and Public Verifiability for Ensuring Cloud Data Integrity." In Advances in Data-Driven Computing and Intelligent Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9531-8_15.
Pełny tekst źródłaZeng, Ke. "Publicly Verifiable Remote Data Integrity." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_28.
Pełny tekst źródłaFeng, Yiteng, Yi Mu, Guomin Yang, and Joseph K. Liu. "A New Public Remote Integrity Checking Scheme with User Privacy." In Information Security and Privacy. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7_22.
Pełny tekst źródłaZhou, Rui, Zhu Ai, Jun Hu, et al. "Data Integrity Checking for iSCSI with Dm-verity." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-7262-5_79.
Pełny tekst źródłaYang, Changsong, Xiaoling Tao, Sufang Wang, and Feng Zhao. "Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage." In Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59016-1_51.
Pełny tekst źródłaLiu, Hongyu, Leiting Chen, and Liyao Zeng. "Cloud Data Integrity Checking with Deduplication for Confidential Data Storage." In Cyberspace Safety and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69471-9_34.
Pełny tekst źródłaYang, Jun, and Shujuan Li. "Searchable Public Key Encryption Scheme with Data Integrity Checking." In Advances on Broad-Band Wireless Computing, Communication and Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49106-6_34.
Pełny tekst źródłaStreszczenia konferencji na temat "Remote data integrity checking"
Sunkireddy, Sravanthi, and Ayad Barsoum. "Remote Data Integrity for Cloud Based Storage System." In SSPC 2016 Greencoat. SSPC, 2016. https://doi.org/10.5006/s2016-00068.
Pełny tekst źródłaChowdary, N. Sampreeth, Shashank Kadiyala, V. Esther Jyothi, P. Srinandan, S. Phani Praveen, and P. Bhanu Prakash. "Identity and Proxy Orientation Based Remote Data Integration Checking and Uploading in Public Clouds." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064101.
Pełny tekst źródłaFloria, Robert, and Alfonso Garcia. "Aggregating and Standardizing Disjointed Integrity Management Data." In CONFERENCE 2022. AMPP, 2022. https://doi.org/10.5006/c2022-17646.
Pełny tekst źródłaHeld, Craig. "Implementing Remote Wireless Monitoring of Pipeline Integrity and Cathodic Protection." In CORROSION 2010. NACE International, 2010. https://doi.org/10.5006/c2010-10028.
Pełny tekst źródłada Costa, Tony, and Matt Barrett. "Improving Cathodic Protection Monitoring Data in the Time of IIoT and Big Data." In CORROSION 2021. AMPP, 2021. https://doi.org/10.5006/c2021-16259.
Pełny tekst źródłaSharma, Prafull, Freddie Talbot, and Phil Yule. "Corrosion Under Insulation (CUI) Remote Monitoring - Case Study and Experiences from Saudi Arabia." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00282.
Pełny tekst źródłaHill, D., S. Marion, F. Ayello, L. Cunci, and N. Sridhar. "Use of Sensor Systems for Remote Monitoring of Corrosion and Structural Health: Case Studies." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09457.
Pełny tekst źródłaStubelj, Ivan Ruiz, Heitor Ruschmann, Kjell Wold, and Jan Olaf Gomnaes. "Pipeline Predictive Analitics Trough On-Line Remote Corrosion Monitoring." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-12899.
Pełny tekst źródłaJenkins, Walt. "A Database and Query System for Refinery Vessels." In CORROSION 1994. NACE International, 1994. https://doi.org/10.5006/c1994-94524.
Pełny tekst źródłaJuzga, Giovanni A., and William L. Garcia. "SIGCO (Corrosion Management Information System): Platform for Managing Corrosion Processes and Integrity in Oilfield Facilities." In LatinCORR 2023. AMPP, 2023. https://doi.org/10.5006/lac23-20553.
Pełny tekst źródłaRaporty organizacyjne na temat "Remote data integrity checking"
Derby, Martin, and Mark Saunders. PR635-203904-R01 In-situ Instrumentation and Remote Sensing Methods for Slope Monitoring for Pipelines. Pipeline Research Council International, Inc. (PRCI), 2022. http://dx.doi.org/10.55274/r0012207.
Pełny tekst źródłaYoel, David, Tina Sicilia, Matthew Bogaart, and Jeremy Fernandes. PR-417-203902-R01 Remote Sensing and Leak Detection Platform That Can Deploy Multiple Sensor Types. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000052.
Pełny tekst źródłaPerez-Vincent, Santiago M., Verónica Abril, Cynthia Chen, Teniola Tayo, and Andres Urrego Jimenez. Crime Underreporting in Latin America and the Caribbean. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013215.
Pełny tekst źródłaGalili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs, and Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, 1994. http://dx.doi.org/10.32747/1994.7570549.bard.
Pełny tekst źródła