Developing wetland landscape insecurity and hydrological security models and measuring their spatial linkages

2021 ◽  
pp. 101461
Author(s):  
Swades Pal ◽  
Sandipta Debanshi
Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


Author(s):  
V.A. Plotnikov ◽  
◽  
M.V. Suleymanova ◽  

1980 ◽  
Vol 15 (1) ◽  
pp. 47-60 ◽  
Author(s):  
M.S Konstantinov ◽  
M.D Markov
Keyword(s):  

2021 ◽  
Vol 787 (1) ◽  
pp. 012053
Author(s):  
D G Wang ◽  
Y J Dou ◽  
A Q Shi ◽  
J Cheng ◽  
D A Lv

Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 10
Author(s):  
Niluka Amarasinghe ◽  
Xavier Boyen ◽  
Matthew McKague

The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised by these schemes. Bitcoin, despite being considered as the most widespread among all, is claimed to have significant lapses in relation to its anonymity. Unfortunately, studies have shown that many cryptocurrency transactions can be traced back to their corresponding participants through the analysis of publicly available data, to which the cryptographic community has responded by proposing new constructions with improved anonymity claims. Nevertheless, the absence of a common metric for evaluating the level of anonymity achieved by these schemes has led to numerous disparate ad hoc anonymity definitions, making comparisons difficult. The multitude of these notions also hints at the surprising complexity of the overall anonymity landscape. In this study, we introduce such a common framework to evaluate the nature and extent of anonymity in (crypto) currencies and distributed transaction systems, thereby enabling one to make meaningful comparisons irrespective of their implementation. Accordingly, our work lays the foundation for formalizing security models and terminology across a wide range of anonymity notions referenced in the literature, while showing how “anonymity” itself is a surprisingly nuanced concept, as opposed to existing claims that are drawn upon at a higher level, thus missing out on the elemental factors underpinning anonymity.


Sign in / Sign up

Export Citation Format

Share Document