Showing 1 - 20 results of 71 for search '"checksum"', query time: 0.18s Refine Results
  1. 1

    Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks by Qiong Zhang

    Published 2016-07-01
    “…Without the help of preshared keys or complex authentication infrastructure, Sec-ARQ protects frame checksum and addresses by cumulated checksum. Cumulated checksum is unknown to adversaries because of unavoidable wireless transmission errors. …”
    Get full text
    Article
  2. 2

    Improve security of wireless sensor networks through reluctant checksum by Qiong Zhang, Jianyu Xiao

    Published 2017-09-01
    “…A reluctant checksum scheme named R-CS is proposed. Based on the inherent characteristic of wireless networks that frame error is inevitable, checksum of frame is protected by accumulated checksum algorithm in R-CS. …”
    Get full text
    Article
  3. 3

    Tximeta: Reference sequence checksums for provenance identification in RNA-seq. by Michael I Love, Charlotte Soneson, Peter F Hickey, Lisa K Johnson, N Tessa Pierce, Lori Shepherd, Martin Morgan, Rob Patro

    Published 2020-02-01
    “…The correct reference transcriptome is identified via a hashed checksum stored in the quantification output, and key transcript databases are downloaded and cached locally. …”
    Get full text
    Article
  4. 4

    USE OF A METHOD OF PASCAL OF CALCULATION OF CHECKSUMS IN NOISEPROOF CODING by Volodymyr Pevnev, Mikhail Tsuranov, Heorhii Zemlianko, Vyacheslav Kharchenko

    Published 2019-11-01
    “…The technique of calculation of Checksum of the message which are used for the control of integrity and restoration distorted the message is developed. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media by Ammar Osamah Hoori

    Published 2023-07-01
    Subjects: “…Checksum; one dimentional parity; 2Dimensional parity; Error Detecting…”
    Get full text
    Article
  8. 8

    Implementasi Mekanisme Keamanan Data dengan Enkripsi Symmetric Key dan Checksum Variable pada Game Online by Herru Darmadi

    Published 2013-12-01
    Subjects: “…symmetric key, checksum, encryption, decryption, integrity of the data game…”
    Get full text
    Article
  9. 9

    Implementasi Kriptografi Dengan Enkripsi Shift Vigenere Chiper Serta Checksum Menggunakan CRC32 Pada Data Text by Syaiful Anwar, Indra Nugroho, Asep Ahmadi

    Published 2017-01-01
    “…Di samping itu untuk meningkatkan keamanan pada perangkat lunak disertakan juga proses Checksum, sehingga perangkat lunak dapat mendeteksi adanya perubahan data atau informasi yang dikirimkan serta menjamin keaslian pengirim informasi dengan menggunakan CRC32. …”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Memory encryption-decryption in embedded systems by Tan, Xuan Yi

    Published 2019
    “…To maintain integrity of data in external memories, the data are hashed to provide a checksum, and memory integrity tree techniques are employed to verify the authenticity of the data. …”
    Get full text
    Final Year Project (FYP)
  14. 14

    Self-Embedding Fragile Watermarking Scheme to Detect Image Tampering Using AMBTC and OPAP Approaches by Cheonshik Kim, Ching-Nung Yang

    Published 2021-01-01
    “…To find a damaged block in a marked image, the authentication data along with the watermark must be hidden in the block. We employ a checksum for authentication. The watermark is embedded in the pixels of the cover image using 3LSB and 2LSB, and the checksum is hidden in the LSB. …”
    Get full text
    Article
  15. 15

    nuID: a universal naming scheme of oligonucleotides for Illumina, Affymetrix, and other microarrays by Kibbe Warren A, Du Pan, Lin Simon M

    Published 2007-05-01
    “…In addition, we added a redundancy check (checksum) to validate the integrity of the identifier. …”
    Get full text
    Article
  16. 16

    Hardware‐assisted remote attestation design for critical embedded systems by Munir Geden, Kasper Rasmussen

    Published 2023-05-01
    “…Second, including dynamic memory regions in the checksum calculation is not helpful in practice, since the verifier typically does not know what those regions should contain or which checksums should be accepted as valid. …”
    Get full text
    Article
  17. 17

    Revolutionizing art education: Integrating AI and multimedia for enhanced appreciation teaching by Liang Zhao, Eslam Hussam, Jin-Taek Seong, Assem Elshenawy, Mustafa Kamal, Etaf Alshawarbeh

    Published 2024-04-01
    “…The data integration from different sources is performed using checksum assessment. The checksum assessment for data provides precise assimilation and content-related data-to-visual representation. …”
    Get full text
    Article
  18. 18

    Passing Corrupt Data Across Network Layers: An Overview of Recent Developments and Issues by Michael Welzl

    Published 2005-02-01
    “…Recent Internet developments seem to make a point for passing corrupt data from the link to the network layer and above instead of ensuring data integrity with a checksum and ARQ. We give an overview of these efforts (the UDP Lite and DCCP protocols) and explain which circumstances would justify delivery of erroneous data; clearly, the missing piece in the puzzle is efficient and meaningful interlayer communication.…”
    Get full text
    Article
  19. 19

    Concurrent and Robust End-to-End Data Integrity Verification Scheme for Flash-Based Storage Devices by Hwajung Kim, Inhwi Hwang, Jeongeun Lee, Heon Y. Yeom, Hanul Sung

    Published 2022-01-01
    “…To detect data corruption caused by network or storage failures during data transfer, the receiver system verifies data integrity by comparing the checksum of the data. However, the internal operation of the storage device is not sufficiently investigated in the existing end-to-end integrity verification techniques. …”
    Get full text
    Article
  20. 20

    Integer codes correcting single errors and double adjacent errors by Miljan Miletic, Aleksandar Radonjic

    Published 2023-10-01
    “…Like other protocols at the network and transport layers, it uses the Internet Checksum (IC) to detect channel errors. The consequence of this is that each corrupted packet is dropped, which can degrade the quality of service perceived by a user. …”
    Get full text
    Article