نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
In the outsourcing spatial database mode,data owner entrust query operations to a third party data server. Due to the third party data server could be affected by external attack or existence of its own insecurity,it is very important to establish an effective mechanism to verify the query results. This paper proposes a new query authentication method based on Apriori algorithm,which will retur...
We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g., the Sarbanes-Oxley act and the Securities and Exchange Commission rule) mandate secure retention of important business records for several years. We provide a mechanism to authenticate bulk repositories of archived documents. ...
Adulteration is a severe issue affecting the herbal industry. Therefore, robust tool needed to address this problem. In current study, Moringabased products (tea) authentication was conducted using DNA barcoding. Two different barcode regions, rbcL and ITS2, were investigated in terms of their effectiveness authenticating products. To proceed with barcoding, good quality gDNA prerequisite for P...
Authentication is a process by which an entity, which could be a person or intended computer, establishes its identity to another entity. In private and public computer networks including the Internet, authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Internet business and many other transactions req...
Abstract—Network information poses great threats from malicious attacks due to the openness and virtuality of network structure. Traditional methods to ensure information security may fail when both integrity and source authentication for information are required. Based on the security of data broadcast channel, a novel Trusted Computing Model (TCM) of network security authentication is propose...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید