نتایج جستجو برای: authenticity protection

تعداد نتایج: 186339  

Journal: :Studies in health technology and informatics 2008
Gouenou Coatrieux Catherine Quantin Julien Montagner Maniane Fassa François-André Allaert Christian Roux

When dealing with medical image management, there is a need to ensure information authenticity and dependability. Being able to verify the information belongs to the correct patient and is issued from the right source is a major concern. Verification can help to reduce the risk of errors when identifying documents in daily practice or when sending a patient's Electronic Health Record. At the sa...

2010
T. LALITHA

The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given of the study of basic building blocks of cryptographic hash functions leads to the study of the cryptographic properties of Boolean functions and the information theoretic appr...

2015
Martín A. Gagliotti Vigil

The amount of information produced in the last decades has grown notably. Much of this information only exists in the form of electronic documents and it has often to be stored for long periods. Therefore, digital archives are increasingly needed. However, for the documents to remain trustworthy while they are archived, they need to be protected by the archivists. Important protection goals tha...

Journal: :IJAMC 2007
Shervin Shirmohammadi Hani Jabbour Jiying Zhao

Audio streaming has become a popular application on the Internet over the past few years, and is expected to grow with the advent of high-speed Internet access. Content adaptability, copyright protection and Quality of Service (QoS) monitoring of these streams are some of the major issues encountered in audio streaming. While many studies have tackled the issue of audio watermarking for copyrig...

2008
Rafael Accorsi

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv 1 Audit: An Approach to Generate Evidence . . . . . . . . . . . . . . . . . . . 1 1.1 IT Audits and their Building Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Audit and Policy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 A...

2010
Celso Gonçalves Marie-Caroline Croset Muriel Ney Nicolas Balacheff Jean-Luc Bosson

A key concern in game-based learning is the level of authenticity games require in order to match what learners can expect in the real world, what keeps them engaged in the game, and what they need to learn. We examined authenticity or credibility in a game from the learner’s perspective. There are very few studies on this aspect. We propose that authenticity is the result of a compromise betwe...

2017
JONATHAN PUGH HANNAH MASLEN JULIAN SAVULESCU

Deep brain stimulation has been of considerable interest to bioethicists, in large part because of the effects that the intervention can occasionally have on central features of the recipient's personality. These effects raise questions regarding the philosophical concept of authenticity. In this article, we expand on our earlier work on the concept of authenticity in the context of deep brain ...

2008
Maik Schott Jana Dittmann Claus Vielhauer Christian Krätzer Andreas Lang

Digital resources and documents have become part of our culture as many cultural and intellectual goods are “born-digital” – existing only in digital form. Therefore digital long-term preservation is sustaining our cultural heritage for the future. Because of its importance digital preservation is addressed by several national and international projects like the German NESTOR project [12], the ...

2009
Hongyan Jia

Th is paper explores the approach to the construction of literary tourism site from the perspective of authenticity which is a keyword in heritage tourism. Since MacCannell (1973, 1976) introduced the concept of authenticity into studies of tourism motivations and experiences in 1970s, the various notions of tourism authenticity can be summarized into four types of theories objective authentici...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید