New technique to insure data integrity for archival files storage (DIFCS)
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 2
Abstract
In this paper we are developing an algorithm to increase the security of using HMAC function (Key-Hashed Message Authentication) to insure data integrity for exchanging archival files. Hash function is a very strong tool used in information security. The algorithm we are developing is safe, quick and will allow the University of Tabuk (UT) authorities to be sure that data of archival document will not be changed or modified by unauthorized personnel through transferring in the network; it will also increase the efficiency of network in which archived files are exchanged. The basic issues of hash functions and data integrity will be presented as well. In this research: The developed algorithm is effective and easy to implement using HMAC algorithm to guarantee data integrity for archival scanned documents in the document management system.
Authors and Affiliations
Mohannad Najjar
Deep Transfer Learning Application for Automated Ischemic Classification in Posterior Fossa CT Images
Computed Tomography (CT) imaging is one of the conventional tools used to diagnose ischemic in Posterior Fossa (PF). Radiologist commonly diagnoses ischemic in PF through CT imaging manually. However, such a procedure co...
Cardiotocographic Diagnosis of Fetal Health based on Multiclass Morphologic Pattern Predictions using Deep Learning Classification
Medical complications of pregnancy and pregnancy-related deaths continue to remain a major global challenge today. Internationally, about 830 maternal deaths occur every day due to pregnancy-related or childbirth-related...
Enhancement of Passive MAC Spoofing Detection Techniques
Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this paper we propo...
Feasibility of automated detection of HONcode conformity for health-related websites
In this paper, authors evaluate machine learning algorithms to detect the trustworthiness of a website according to HONcode criteria of conduct (detailed in paper). To derive a baseline, we evaluated a Naive Bayes algori...
Reliability and Connectivity Analysis of Vehicluar Ad Hoc Networks for a Highway Tunnel
Vehicular ad-hoc network (VANET) uses ‘mobile internet’ to facilitate the communication between vehicles and with the goal to ensure road safety and achieve secure communication. Thus the reliability of this type of netw...