-
1
Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
Published 2016-07-01“…Without the help of preshared keys or complex authentication infrastructure, Sec-ARQ protects frame checksum and addresses by cumulated checksum. Cumulated checksum is unknown to adversaries because of unavoidable wireless transmission errors. …”
Get full text
Article -
2
Improve security of wireless sensor networks through reluctant checksum
Published 2017-09-01“…A reluctant checksum scheme named R-CS is proposed. Based on the inherent characteristic of wireless networks that frame error is inevitable, checksum of frame is protected by accumulated checksum algorithm in R-CS. …”
Get full text
Article -
3
Tximeta: Reference sequence checksums for provenance identification in RNA-seq.
Published 2020-02-01“…The correct reference transcriptome is identified via a hashed checksum stored in the quantification output, and key transcript databases are downloaded and cached locally. …”
Get full text
Article -
4
USE OF A METHOD OF PASCAL OF CALCULATION OF CHECKSUMS IN NOISEPROOF CODING
Published 2019-11-01“…The technique of calculation of Checksum of the message which are used for the control of integrity and restoration distorted the message is developed. …”
Get full text
Article -
5
Certifying checksum-based logging in the RapidFSCQ crash-safe filesystem
Published 2017Get full text
Thesis -
6
Polynomial Intermediate Checksum for Integrity under Releasing Unverified Plaintext and Its Application to COPA
Published 2024-03-01Subjects: Get full text
Article -
7
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
Published 2023-07-01Subjects: “…Checksum; one dimentional parity; 2Dimensional parity; Error Detecting…”
Get full text
Article -
8
Implementasi Mekanisme Keamanan Data dengan Enkripsi Symmetric Key dan Checksum Variable pada Game Online
Published 2013-12-01Subjects: “…symmetric key, checksum, encryption, decryption, integrity of the data game…”
Get full text
Article -
9
Implementasi Kriptografi Dengan Enkripsi Shift Vigenere Chiper Serta Checksum Menggunakan CRC32 Pada Data Text
Published 2017-01-01“…Di samping itu untuk meningkatkan keamanan pada perangkat lunak disertakan juga proses Checksum, sehingga perangkat lunak dapat mendeteksi adanya perubahan data atau informasi yang dikirimkan serta menjamin keaslian pengirim informasi dengan menggunakan CRC32. …”
Get full text
Article -
10
A software redundancy method for improving reliability of data storage of EEPROM
Published 2013-01-01Subjects: Get full text
Article -
11
CONCEALMENT OF PRIVATE INFORMATION USING THE SPECIAL FILE SYSTEM
Published 2016-08-01Subjects: Get full text
Article -
12
-
13
Memory encryption-decryption in embedded systems
Published 2019“…To maintain integrity of data in external memories, the data are hashed to provide a checksum, and memory integrity tree techniques are employed to verify the authenticity of the data. …”
Get full text
Final Year Project (FYP) -
14
Self-Embedding Fragile Watermarking Scheme to Detect Image Tampering Using AMBTC and OPAP Approaches
Published 2021-01-01“…To find a damaged block in a marked image, the authentication data along with the watermark must be hidden in the block. We employ a checksum for authentication. The watermark is embedded in the pixels of the cover image using 3LSB and 2LSB, and the checksum is hidden in the LSB. …”
Get full text
Article -
15
nuID: a universal naming scheme of oligonucleotides for Illumina, Affymetrix, and other microarrays
Published 2007-05-01“…In addition, we added a redundancy check (checksum) to validate the integrity of the identifier. …”
Get full text
Article -
16
Hardware‐assisted remote attestation design for critical embedded systems
Published 2023-05-01“…Second, including dynamic memory regions in the checksum calculation is not helpful in practice, since the verifier typically does not know what those regions should contain or which checksums should be accepted as valid. …”
Get full text
Article -
17
Revolutionizing art education: Integrating AI and multimedia for enhanced appreciation teaching
Published 2024-04-01“…The data integration from different sources is performed using checksum assessment. The checksum assessment for data provides precise assimilation and content-related data-to-visual representation. …”
Get full text
Article -
18
Passing Corrupt Data Across Network Layers: An Overview of Recent Developments and Issues
Published 2005-02-01“…Recent Internet developments seem to make a point for passing corrupt data from the link to the network layer and above instead of ensuring data integrity with a checksum and ARQ. We give an overview of these efforts (the UDP Lite and DCCP protocols) and explain which circumstances would justify delivery of erroneous data; clearly, the missing piece in the puzzle is efficient and meaningful interlayer communication.…”
Get full text
Article -
19
Concurrent and Robust End-to-End Data Integrity Verification Scheme for Flash-Based Storage Devices
Published 2022-01-01“…To detect data corruption caused by network or storage failures during data transfer, the receiver system verifies data integrity by comparing the checksum of the data. However, the internal operation of the storage device is not sufficiently investigated in the existing end-to-end integrity verification techniques. …”
Get full text
Article -
20
Integer codes correcting single errors and double adjacent errors
Published 2023-10-01“…Like other protocols at the network and transport layers, it uses the Internet Checksum (IC) to detect channel errors. The consequence of this is that each corrupted packet is dropped, which can degrade the quality of service perceived by a user. …”
Get full text
Article