Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("data integrity")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 986

  • Page / 40
Export

Selection :

  • and

Technical Perspective : Safeguarding Online Information against Failures and AttacksLISKOV, Barbara.Communications of the ACM. 2008, Vol 51, Num 11, pp 85-85, issn 0001-0782, 1 p.Article

Qualité des entrepôts de données : Conception et manipulationFEKI, Jamel; BEN-ABDALLAH, Hanene.Ingénierie des systèmes d'information (2001). 2011, Vol 16, Num 6, issn 1633-1311, 158 p.Serial Issue

A tree-based forward digest protocol to verify data integrity in distributed media streamingHABIB, Ahsan; DONGYAN XU; ATALLAH, Mikhail et al.IEEE transactions on knowledge and data engineering. 2005, Vol 17, Num 7, pp 1010-1014, issn 1041-4347, 5 p.Article

Guaranteeing the Integrity of Data by Using a Digital SignatureYUCHT, Eliezer; ENGELBERG, Shlomo; COHEN, Benjamin et al.IEEE instrumentation & measurement magazine. 2009, Vol 12, Num 5, pp 45-49, issn 1094-6969, 5 p.Article

Maintaining data integrity in microarray data managementGRANT, G. R; MANDUCHI, E; PIZARRO, A et al.Biotechnology and bioengineering. 2003, Vol 84, Num 7, pp 795-800, issn 0006-3592, 6 p.Article

Dynamic Steganography Adds Additional Data SecurityZAVALETA, Richard; WUNNAVA, Subbarao.IEEE Southeastcon. 2004, pp 390-394, isbn 0-7803-8367-2, 1Vol, 5 p.Conference Paper

An efficient dynamic and distributed cryptographic accumulatorGOODRICH, Michael T; TAMASSIA, Roberto; HASI, Jasminka et al.Lecture notes in computer science. 2002, pp 372-388, issn 0302-9743, isbn 3-540-44270-7, 17 p.Conference Paper

Perspectives on the CAP Theorem : THE GROWING IMPACT OF THE CAP THEOREMGILBERT, Seth; LYNCH, Nancy A.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 30-36, issn 0018-9162, 7 p.Article

A coding approach for detection of tampering in write-once optical disksBLAUM, M; BRUCK, J; RUBIN, K et al.IEEE transactions on computers. 1998, Vol 47, Num 1, pp 120-125, issn 0018-9340Article

Portable security transaction protocolBENSON, Glenn.Computer networks (1999). 2007, Vol 51, Num 3, pp 751-766, issn 1389-1286, 16 p.Article

M-TREE : A high efficiency security architecture for protecting integrity and privacy of softwareCHENGHUAI LU; TAO ZHANG; WEIDONG SHI et al.Journal of parallel and distributed computing (Print). 2006, Vol 66, Num 9, pp 1116-1128, issn 0743-7315, 13 p.Article

Semi-fragile watermark for sensor dataKAMEL, Ibrahim; ALKOKY, Osama.International journal of Internet protocol technology (Print). 2011, Vol 6, Num 3, pp 156-171, issn 1743-8209, 16 p.Article

Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) DataJIANG, Zoe L; JUNBIN FANG; LAW, Frank Y. W et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 5-6, pp 821-828, issn 1556-6013, 8 p.Article

A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public VerifiabilityZHUO HAO; SHENG ZHONG; NENGHAI YU et al.IEEE transactions on knowledge and data engineering. 2011, Vol 23, Num 9, pp 1432-1437, issn 1041-4347, 6 p.Article

Estimating the Principal of an Application's Technical Debt : TECHNICAL DEBTCURTIS, Bill; SAPPIDI, Jay; SZYNKARSKI, Alexandra et al.IEEE software. 2012, Vol 29, Num 6, pp 34-42, issn 0740-7459, 9 p.Article

Security protocols for biometrics-based cardholder authentication in smartcardsRILA, Luciano; MITCHELL, Chris J.Lecture notes in computer science. 2003, pp 254-264, issn 0302-9743, isbn 3-540-20208-0, 11 p.Conference Paper

Data and infrastructure security auditing in cloud computing environmentsRASHEED, Hassan.International journal of information management. 2014, Vol 34, Num 3, pp 364-368, issn 0268-4012, 5 p.Article

Consistency Tradeoffs in Modern Distributed Database System Design : THE GROWING IMPACT OF THE CAP THEOREMABADI, Daniel J.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 37-42, issn 0018-9162, 6 p.Article

Efficient Consistency Achievement of Federated Identity and Access Management Based on a Novel Self-Adaptable ApproachCHA, Shi-Cho; CHANG, Hsiang-Meng.IEICE transactions on information and systems. 2012, Vol 95, Num 2, pp 577-587, issn 0916-8532, 11 p.Article

Definition of primary flight referenceNEWMAN, R. L.Journal of aircraft. 1998, Vol 35, Num 3, pp 497-500, issn 0021-8669Article

Le protocole SSH = SSH protocolHAJJEH, Ibrahim; BADRA, Mohamad.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2006, Vol SI, Num H5235, issn 1953-4663, H5235.1-H5235.14Article

Analysing the impact of adding integrity constraints to information systemsEMBURY, Suzanne M; JIANHUA SHAO.Lecture notes in computer science. 2003, pp 175-192, issn 0302-9743, isbn 3-540-40442-2, 18 p.Conference Paper

Group Diffie-Hellman key exchange secure against dictionary attacksBRESSON, Emmanuel; CHEVASSUT, Olivier; POINTCHEVAL, David et al.Lecture notes in computer science. 2002, pp 497-514, issn 0302-9743, isbn 3-540-00171-9, 18 p.Conference Paper

Overcoming CAP with Consistent Soft-State Replication : THE GROWING IMPACT OF THE CAP THEOREMBIRMAN, Kenneth P; FREEDMAN, Daniel A; QI HUANG et al.Computer (Long Beach, CA). 2012, Vol 45, Num 2, pp 50-57, issn 0018-9162, 8 p.Article

Meeting the challenge of high quality data entry : a free double-entry systemBARCHARD, Kimberly A; PACE, Larry A.International journal of services and standards (Print). 2008, Vol 4, Num 4, pp 359-376, issn 1740-8849, 18 p.Article

  • Page / 40