نتایج جستجو برای: authenticity protection
تعداد نتایج: 186339 فیلتر نتایج به سال:
When dealing with medical image management, there is a need to ensure information authenticity and dependability. Being able to verify the information belongs to the correct patient and is issued from the right source is a major concern. Verification can help to reduce the risk of errors when identifying documents in daily practice or when sending a patient's Electronic Health Record. At the sa...
The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given of the study of basic building blocks of cryptographic hash functions leads to the study of the cryptographic properties of Boolean functions and the information theoretic appr...
The amount of information produced in the last decades has grown notably. Much of this information only exists in the form of electronic documents and it has often to be stored for long periods. Therefore, digital archives are increasingly needed. However, for the documents to remain trustworthy while they are archived, they need to be protected by the archivists. Important protection goals tha...
Audio streaming has become a popular application on the Internet over the past few years, and is expected to grow with the advent of high-speed Internet access. Content adaptability, copyright protection and Quality of Service (QoS) monitoring of these streams are some of the major issues encountered in audio streaming. While many studies have tackled the issue of audio watermarking for copyrig...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv 1 Audit: An Approach to Generate Evidence . . . . . . . . . . . . . . . . . . . 1 1.1 IT Audits and their Building Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Audit and Policy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 A...
A key concern in game-based learning is the level of authenticity games require in order to match what learners can expect in the real world, what keeps them engaged in the game, and what they need to learn. We examined authenticity or credibility in a game from the learner’s perspective. There are very few studies on this aspect. We propose that authenticity is the result of a compromise betwe...
Deep brain stimulation has been of considerable interest to bioethicists, in large part because of the effects that the intervention can occasionally have on central features of the recipient's personality. These effects raise questions regarding the philosophical concept of authenticity. In this article, we expand on our earlier work on the concept of authenticity in the context of deep brain ...
Digital resources and documents have become part of our culture as many cultural and intellectual goods are “born-digital” – existing only in digital form. Therefore digital long-term preservation is sustaining our cultural heritage for the future. Because of its importance digital preservation is addressed by several national and international projects like the German NESTOR project [12], the ...
Th is paper explores the approach to the construction of literary tourism site from the perspective of authenticity which is a keyword in heritage tourism. Since MacCannell (1973, 1976) introduced the concept of authenticity into studies of tourism motivations and experiences in 1970s, the various notions of tourism authenticity can be summarized into four types of theories objective authentici...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید