Transferring data is one of the key operations performed by millions of users every day. Users do this by issuing direct commands, such as file transfer commands, or indirectly as a feature invoked by numerous end-user applications. The most important security characteristic of a successful data exchange is the integrity of that data. The receiver user desires to acquire data that has not been modified through malicious acts, or simple human or machine error. Applications that rely on the Transfer Control Protocol (TCP) as the main mechanism to provide end-to-end reliability, including error and sequence control, do not check the integrity of the file being transmitted prior to the transfer. In this paper, we present an overview of current ...
Digital storage demand is growing with the increasing use of digital artifacts from media files to b...
In today’s computing era,there has arisen an immense requirement for secure and trusted security fra...
In untrusted and trusted computing environments, the problem of secure file transfer between various...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Abstract — Communication is one of the basic necessities of human beings. File transfer is one of th...
Abstract Objective of this paper is to enchance the security while tranfering data between two host ...
We observe that a certain RSA-based secure hash function is homomorphic. We describe a protocol base...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe secu...
As an important application in cloud computing, cloud storage provides data users flexible, scalable...
IT systems and data that you store, and process are valuable resources that need protection. Validat...
With block transfers, a file is transferred in fixed chunks size made up of a header portion (transm...
Paper presents the concept of the hash function use in order to examine changes in file integration ...
In the present work we study applied cryptography. . . The goal of this work is not to study algorit...
Digital storage demand is growing with the increasing use of digital artifacts from media files to b...
In today’s computing era,there has arisen an immense requirement for secure and trusted security fra...
In untrusted and trusted computing environments, the problem of secure file transfer between various...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Transferring data is one of the key operations performed by millions of users every day. Users do th...
Abstract — Communication is one of the basic necessities of human beings. File transfer is one of th...
Abstract Objective of this paper is to enchance the security while tranfering data between two host ...
We observe that a certain RSA-based secure hash function is homomorphic. We describe a protocol base...
The amount of data generated by scientific and commercial applications is growing at an ever-increas...
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe secu...
As an important application in cloud computing, cloud storage provides data users flexible, scalable...
IT systems and data that you store, and process are valuable resources that need protection. Validat...
With block transfers, a file is transferred in fixed chunks size made up of a header portion (transm...
Paper presents the concept of the hash function use in order to examine changes in file integration ...
In the present work we study applied cryptography. . . The goal of this work is not to study algorit...
Digital storage demand is growing with the increasing use of digital artifacts from media files to b...
In today’s computing era,there has arisen an immense requirement for secure and trusted security fra...
In untrusted and trusted computing environments, the problem of secure file transfer between various...