Transferring data is one of the key operations performed by millions of users every day. Users do this by issuing direct commands, such as file transfer commands, or indirectly as a feature invoked by numerous end-user applications. The most important security characteristic of a successful data exchange is the integrity of that data. The receiver user desires to acquire data that has not been modified through malicious acts, or simple human or machine error. Applications that rely on the Transfer Control Protocol (TCP) as the main mechanism to provide end-to-end reliability, including error and sequence control, do not check the integrity of the file being transmitted prior to the transfer. In this paper, we present an overview of current ...
Paper presents the concept of the hash function use in order to examine changes in file integration ...
Cyber-physical systems are pervasive in today’s society with applications ranging from critical infr...
As an important application in cloud computing, cloud storage provides data users flexible, scalable...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Abstract — Communication is one of the basic necessities of human beings. File transfer is one of th...
Abstract Objective of this paper is to enchance the security while tranfering data between two host ...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
IT systems and data that you store, and process are valuable resources that need protection. Validat...
We observe that a certain RSA-based secure hash function is homomorphic. We describe a protocol base...
With block transfers, a file is transferred in fixed chunks size made up of a header portion (transm...
Information needed in life, to get information and exchange information needed is easy to do anytime...
Information needed in life, to get information and exchange information needed is easy to do anytime...
Data integrity is a prerequisite for ensuring data availability of IoT data and has received extensi...
Abstract: This paper presents a novel encryption-less algorithm to enhance security in transmission ...
Paper presents the concept of the hash function use in order to examine changes in file integration ...
Cyber-physical systems are pervasive in today’s society with applications ranging from critical infr...
As an important application in cloud computing, cloud storage provides data users flexible, scalable...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Abstract — Communication is one of the basic necessities of human beings. File transfer is one of th...
Abstract Objective of this paper is to enchance the security while tranfering data between two host ...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
IT systems and data that you store, and process are valuable resources that need protection. Validat...
We observe that a certain RSA-based secure hash function is homomorphic. We describe a protocol base...
With block transfers, a file is transferred in fixed chunks size made up of a header portion (transm...
Information needed in life, to get information and exchange information needed is easy to do anytime...
Information needed in life, to get information and exchange information needed is easy to do anytime...
Data integrity is a prerequisite for ensuring data availability of IoT data and has received extensi...
Abstract: This paper presents a novel encryption-less algorithm to enhance security in transmission ...
Paper presents the concept of the hash function use in order to examine changes in file integration ...
Cyber-physical systems are pervasive in today’s society with applications ranging from critical infr...
As an important application in cloud computing, cloud storage provides data users flexible, scalable...