Search

Your search keyword '"Data integrity"' showing total 19,292 results

Search Constraints

Start Over You searched for: Descriptor "Data integrity" Remove constraint Descriptor: "Data integrity"
19,292 results on '"Data integrity"'

Search Results

1. Confidential Container Groups.

2. The Future of Consumer Research Methods: Lessons of a Prospective Retrospective.

3. Rapid subsurface analysis of frequency-domain thermoreflectance images with K-means clustering.

4. Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.

6. A Whispering Widgets and Wireless Wonders Pioneering Change in the World of IoT

7. Does equity premium puzzle exist in China: an analysis with the robust inference method.

8. La privacidad en el ámbito deportivo: una discusión desde la captura y tratamiento de datos sensibles a través de wearables.

9. Blockchain‐based transparent and certificateless data integrity auditing for cloud storage.

10. ОСНОВНІ АСПЕКТИ МЕХАНІЗМУ ЗАБЕЗПЕЧЕННЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ ПІДПРИЄМНИЦЬКОЇ ДІЯЛЬНОСТІ

11. A comparison of conventional and resampled personal reliability in detecting careless responding.

12. Simultaneous Recovery Model for Missing Multiple-Source Structural Health Monitoring Data of a Quayside Container Crane.

13. Ultra-processed food consumption and the risk of incident chronic kidney disease: a systematic review and meta-analysis of cohort studies.

14. Homomorphic technique for group data sharing in cloud computing environment.

15. Secure data transmission in power systems using blockchain technology.

16. A novel approach for missing data recovery and fault nodes detection in wireless sensor networks.

17. Public Librarians on the Front Lines: Strategies and Knowledge Practices for Combating Information Disorders.

18. Feature screening for ultra-high-dimensional data via multiscale graph correlation.

19. Securing blockchain-enabled smart health care image encryption framework using Tinkerbell Map.

20. Naturally occurring organosulfur compounds effectively inhibits PCSK-9 activity and restrict PCSK-9-LDL-receptor interaction via in-silico and in-vitro approach.

21. Ensuring Security and Privacy in VANET: A Comprehensive Survey of Authentication Approaches.

22. Only you can check my data: certificateless and designed-verifier auditing of multi-cloud storage with faults localization.

23. ПРАВОВЕ РЕГУЛЮВАННЯ ЗАХИСТУ ІНФОРМАЦІЇ ПРО ОСОБИСТЕ ТА СІМЕЙНЕ ЖИТТЯ ОСОБИ В УМОВАХ ВОЄННОГО СТАНУ.

24. Blockchain‐based decentralized oracle network framework for identity management in metaverse environment.

25. The Individual Participant Data Integrity Tool for assessing the integrity of randomised trials.

26. Quality risk management and data integrity in R&D laboratories supporting CMC lifecycle of biological products.

27. Within-subject variation of C-reactive protein and high-sensitivity C-reactive protein: A systematic review and meta-analysis.

28. Perioperative mortality in low-, middle-, and high-income countries: Protocol for a multi-level meta-regression analysis.

29. Emergence of semi‐synthetic cannabinoids in cannabis products seized in Eastern Denmark over a 6‐year period.

30. A smart contract-driven access control scheme with integrity checking for electronic health records.

31. BLOCKCHAIN-ENABLED SUPPLY CHAIN MANAGEMENT: IMPLICATIONS FOR THE LAND TRANSPORTATION SECTOR.

32. Percutaneous Cryoablation in the Liver: A Meta-Analysis and Review of Safety with a Focus on Incidence of Cryoshock and Major Complications.

33. Key Frame Selection for Temporal Graph Optimization of Skeleton-Based Action Recognition.

34. Concurrent Access Performance Comparison Between Relational Databases and Graph NoSQL Databases for Complex Algorithms.

35. ASMTP: Anonymous secure messaging token‐based protocol assisted data security in swarm of unmanned aerial vehicles.

36. A Provably Secure and Lightweight Two-Factor Authentication Protocol for Wireless Sensor Network.

37. Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments.

38. Blockchain-based intelligent tracing of food grain crops from production to delivery.

39. ParallelChain: a scalable healthcare framework with low‐energy consumption using blockchain.

40. B-ERAC: BLOCKCHAIN-ENABLED ROLE-BASED ACCESS CONTROL FOR SECURE IOT DEVICE COMMUNICATION.

41. ENHANCING BLACK HOLE ATTACK DETECTION IN VANETS: A HYBRID APPROACH INTEGRATING DBSCAN CLUSTERING WITH DECISION TREES.

42. Intelligent botnet detection in IoT networks using parallel CNN‐LSTM fusion.

43. Resilient Self-Triggered Model Predictive Control of Discrete-Time Nonlinear Cyberphysical Systems Against False Data Injection Attacks.

44. Computational approaches for cyber social threats.

45. 星载轻量化区块链边缘节点多级安全架构设计.

46. Agenda-setting in the clinical encounter: A systematic review protocol.

47. Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function.

48. Ponte: Represent Totally Binary Neural Network Toward Efficiency.

49. High-Quality Image Compression Algorithm Design Based on Unsupervised Learning.

50. Electric load forecasting under false data injection attacks via denoising deep learning and generative adversarial networks.

Catalog

Books, media, physical & digital resources