The current Web has no general mechanisms to make digital artifacts-such as datasets, code, texts, and imagesverifiable and permanent. For digital artifacts that are supposed to be immutable, there is moreover no commonly accepted method to enforce this immutability. These shortcomings have a serious negative impact on the ability to reproduce the results of processes that rely on Web resources, which in turn heavily impacts areas such as science where reproducibility is important. To solve this problem, we propose trusty URIs containing cryptographic hash values. We show how trusty URIs can be used for the verification of digital artifacts, in a manner that is independent of the serialization format in the case of structured data files suc...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
To establish that a document was created after a given moment in time, it is necessary to report eve...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...
The current Web has no general mechanisms to make digital artifacts-such as datasets, code, texts, a...
Abstract. To make digital resources on the web verifiable, immutable, and permanent, we propose a te...
To make digital resources on the web verifiable, immutable, and permanent, we propose a technique to...
To make digital artifacts, for example, code, datasets, messages, and pictures obvious and changeles...
Digital items supported within the project context transpires with use RDF formats(with html links) ...
We present a “content integrity service” for long-lived digital documents, especially for objects st...
How can a publisher store digital information so that any reader can reliably test its authenticity,...
Unreproducibility stemming from a loss of data integrity can be prevented with hash functions, secur...
As the amount of information resources on the Web keeps increasing so are the concerns for informati...
During their lifecycle, digital resources, notably digital representation of artistic work, may ofte...
<!--[if gte mso 9]><xml> Normal 0 </xml><![endif]--> In the future, a scholar or researcher will w...
<p>We propose a server network based on nanopublications and trusty URIs for publishing, retrieving,...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
To establish that a document was created after a given moment in time, it is necessary to report eve...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...
The current Web has no general mechanisms to make digital artifacts-such as datasets, code, texts, a...
Abstract. To make digital resources on the web verifiable, immutable, and permanent, we propose a te...
To make digital resources on the web verifiable, immutable, and permanent, we propose a technique to...
To make digital artifacts, for example, code, datasets, messages, and pictures obvious and changeles...
Digital items supported within the project context transpires with use RDF formats(with html links) ...
We present a “content integrity service” for long-lived digital documents, especially for objects st...
How can a publisher store digital information so that any reader can reliably test its authenticity,...
Unreproducibility stemming from a loss of data integrity can be prevented with hash functions, secur...
As the amount of information resources on the Web keeps increasing so are the concerns for informati...
During their lifecycle, digital resources, notably digital representation of artistic work, may ofte...
<!--[if gte mso 9]><xml> Normal 0 </xml><![endif]--> In the future, a scholar or researcher will w...
<p>We propose a server network based on nanopublications and trusty URIs for publishing, retrieving,...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
To establish that a document was created after a given moment in time, it is necessary to report eve...
This disclosure describes techniques to verify the authenticity of digital images using digital sign...