Design and implementation of a cloud encryption transmission scheme supporting integrity verification

2021 ◽  
Vol 1 (1) ◽  
pp. 1
Author(s):  
Jianwei Zhang ◽  
Zuodong Wu ◽  
Zengyu Cai
2014 ◽  
Vol 539 ◽  
pp. 220-223
Author(s):  
Hua Zhang

This paper discussed the problem of wireless sensor network data transmission protocols, and combined with the characteristics of WSN and the actual needs, the design and implementation of a data transmission priority queue and priority transmission scheme of ACK, provide an end-to-end transmission for the important information, and achieve the timely, reliable transmission of control information.


2014 ◽  
Vol 631-632 ◽  
pp. 918-922
Author(s):  
Ting Ting Li ◽  
Rui Li Jiao

At present, MD5 algorithm is commonly used in the file transfer system to conduct the tests of file integrity, but when a file is too large, it will take a long time to generate MD5 code for the whole file, with the result of reducing the transmission efficiency of the file. Based on this conduction, a fast algorithm of file integrity detection is provided, which can generate MD5 code with the file size and some random content of the file. Although the algorithm cannot test files roundly, it is integrated into the file transfer system. The test results show that this algorithm can detect the file integrity faster, and when the file is damaged or tampered with, the probability of detecting changes of the file content is higher than the theoretical value. The algorithm has great value in engineering applications.


2015 ◽  
Vol 24 (3) ◽  
pp. 106-113 ◽  
Author(s):  
Stephen N. Calculator

Purpose To provide an overview of communication characteristics exhibited by individuals with Angelman Syndrome (AS) and special considerations associated with the design and implementation of augmentative and alternative communication (AAC) programs. Method Results of recent studies exploring individuals' uses of AAC are reviewed, with particular emphasis on factors related to individuals' acceptance and successful uses of AAC systems. Results Not applicable Conclusion Despite their inconsistent access to practices previously found to foster individuals' acceptance of AAC systems, individuals with AS demonstrate the ability to use AAC systems, including high-tech AAC devices, successfully.


2017 ◽  
Author(s):  
Alicia Papas ◽  
Anthony D. LaMontagne ◽  
Allison J. Milner ◽  
Amanda Allisey ◽  
Andrew J. Noblet ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document