Conferences related to Data Integrity

Back to Top

2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )

ETFA focus is on the latest developments and new technologies in the field of industrial and factory automation. The conference aims to exchange ideas with both industry leaders and a variety of experienced researchers, developers, and practitioners from several industries, research institutes, and academia


2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and postersessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE


2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

    EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2020 IEEE IAS Petroleum and Chemical Industry Committee (PCIC)

The PCIC provides an international forum for the exchange of electrical applications technology related to the petroleum and chemical industry. The PCIC annual conference is rotated across North American locations of industry strength to attract national and international participation. User, manufacturer, consultant, and contractor participation is encouraged to strengthen the conference technical base. Success of the PCIC is built upon high quality papers, individual recognition, valued standards activities, mentoring, tutorials, networking and conference sites that appeal to all.


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


More Conferences

Periodicals related to Data Integrity

Back to Top

Advanced Packaging, IEEE Transactions on

The IEEE Transactions on Advanced Packaging has its focus on the modeling, design, and analysis of advanced electronic, photonic, sensors, and MEMS packaging.


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Circuits and Systems II: Express Briefs, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Data Integrity

Back to Top

Xplore Articles related to Data Integrity

Back to Top

An Approach to Verifying Data Integrity for Cloud Storage

2017 13th International Conference on Computational Intelligence and Security (CIS), 2017

The developments of cloud computing technology and reliable modern network have been motivating users to store data in cloud servers and rendering security of cloud computing a focus of attention. While data security can be ensured by data encryption technology, data integrity is secured by certain checking algorithm. A verification method of data integrity which can be performed repeatedly is ...


A Survey on Data Integrity Checking in Cloud

2018 1st International Cognitive Cities Conference (IC3), 2018

Cloud storage which provides efficiency and convenience has been paid more and more attention by not only users but also researchers. Users can save their local costs by outsourcing the data to the cloud. While enjoying the benefits of cloud storage, the users are also worried about whether their data remain intact in the cloud or whether their private information ...


Optimization of Multipath Routing for Delay and Data Integrity Using Clustering in Wireless Sensor Network

2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), 2017

Applications required a high integrity routing mechanism to regulate a large amount of traffic to inject within the network to assurance reliable packet delivery and avoid packet in Wireless Sensor Network (WSN). The different application has different Quality of Services (QoS) requirement when running on the same WSN. Mainly two basic requirements consider in WSN and they are high data ...


Enhancing Data Integrity and Privacy in the Cloud: An Agenda

Computer, 2013

To address users' security concerns, cloud service providers must implement strategies that enhance data integrity and privacy. New data auditing and encryption methods open a path toward these goals.


Data Integrity: Recovering from Ransomware and Other Destructive Events

2018 IEEE Cybersecurity Development (SecDev), 2018

The National Cybersecurity Center of Excellence (NCCoE) is helping enterprises ensure the integrity of their data through collaborative efforts with industry and the information technology (IT) community, including vendors of cybersecurity solutions. This abstract provides an overview of the NIST Cybersecurity Practice Guide SP 1800-11, Data Integrity: Recovering from Ransomware and Other Destructive Events.


More Xplore Articles

Educational Resources on Data Integrity

Back to Top

IEEE-USA E-Books

  • An Approach to Verifying Data Integrity for Cloud Storage

    The developments of cloud computing technology and reliable modern network have been motivating users to store data in cloud servers and rendering security of cloud computing a focus of attention. While data security can be ensured by data encryption technology, data integrity is secured by certain checking algorithm. A verification method of data integrity which can be performed repeatedly is proposed after the comprehensive analysis of the feature of static data stored in a cloud server and its security requirements. The client preprocesses the data file according to the times that the data is required checking, and then upload the data file with check metadata to cloud server, so that the client can spot check the data within limited times and judge the data integrity. Through the analysis of security and performance, we show that this scheme can efficiently verify the data integrity and resist the replay attack and MitM (Man-in-the-middle attack).

  • A Survey on Data Integrity Checking in Cloud

    Cloud storage which provides efficiency and convenience has been paid more and more attention by not only users but also researchers. Users can save their local costs by outsourcing the data to the cloud. While enjoying the benefits of cloud storage, the users are also worried about whether their data remain intact in the cloud or whether their private information has been leaked. This makes them hesitate to outsource their data and cannot fully trust the cloud servers. Because of the concern of users, data integrity becomes an essential security factor of cloud storage. Many scholars have dedicated themselves to the research of data integrity checking for users' security requirements. In this paper, we survey the latest protocols about data integrity checking in cloud and analyze some important requirements and issues of this kind of protocols. The merits and demerits of the protocols are discussed, and the performance is compared with each other as well.

  • Optimization of Multipath Routing for Delay and Data Integrity Using Clustering in Wireless Sensor Network

    Applications required a high integrity routing mechanism to regulate a large amount of traffic to inject within the network to assurance reliable packet delivery and avoid packet in Wireless Sensor Network (WSN). The different application has different Quality of Services (QoS) requirement when running on the same WSN. Mainly two basic requirements consider in WSN and they are high data integrity and low delay. Integrity and Delay Differentiation Routing (IDDR) protocol achieves both QoS requirements high data integrity and low delay. In proposed system to improve the performance of the network delay and energy consumption, we implement clustering and scheduling algorithm with IDDR. If the hotspot is generated at sensor node while transmitting the data, then node create a cluster and find the Cluster Head (CH) with high energy and minimum depth value. Data in the queue within the hotspot will redirect through different route using CH. This will reduce the percentage of packet drop and delay in the network.

  • Enhancing Data Integrity and Privacy in the Cloud: An Agenda

    To address users' security concerns, cloud service providers must implement strategies that enhance data integrity and privacy. New data auditing and encryption methods open a path toward these goals.

  • Data Integrity: Recovering from Ransomware and Other Destructive Events

    The National Cybersecurity Center of Excellence (NCCoE) is helping enterprises ensure the integrity of their data through collaborative efforts with industry and the information technology (IT) community, including vendors of cybersecurity solutions. This abstract provides an overview of the NIST Cybersecurity Practice Guide SP 1800-11, Data Integrity: Recovering from Ransomware and Other Destructive Events.

  • A novel data auditing approach to achieve data privacy and data integrity in cloud computing

    Cloud computing is a general term for the delivery of hosted services over the internet. Using the cloud services saves both users time and money. However, there are some security issues to be solved for personal users and enterprises to store data in the cloud. The fact is that users will not have any physical control over the outsourced data. The cloud user is concerned about the integrity of his data stored in the cloud as it can be attacked by attacker. The purpose of this paper is to suggest an efficient public auditing technique using Third Party Auditor (TPA) to verify the integrity of data stored in the cloud. The proposed auditing scheme makes use of AES algorithm for encryption and Secure Hash Algorithm (SHA-2) algorithm to generate verification metadata or message digest for data integrity check. The analysis shows that the proposed scheme is provably secure and TPA takes a constant time to audit files of different sizes.

  • Audit Cloud: Ensuring Data Integrity for Mobile Devices in Cloud Storage

    One of the promising field sectors of service provision turns out to be Cloud Computing. It involves storing the user's data to be able to use the applications and services that the cloud introduces. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud. Data Integrity Verification is one of the massive responsibilities of cloud data to reduce the participation in activities which manipulates the data of cloud users and providers. There are many ways to address this problem. Using Encryption and Decryption process for the data can solve the problem but it requires huge computing time and functional overheads. Applying data auditing can solve this problem. The main approach of this system is variant Paillier Homomorphic Cryptography (PHC) system with Homomorphic tag and combinatorial batch codes. Data Auditing consists of Provable Data Possession (PDP) and Proof of Retrievability (POR) techniques but these techniques have the limitations of queries. The Integrity Verification using the Third Party Auditor in the Proposed Scheme states the solution for the manipulation of data. The experimental results show the effectiveness and efficiency of the proposed system.

  • Work-in-Progress: A Chip-Level Security Framework for Assessing Sensor Data Integrity

    The continuously increasing inter-connectivity of sensor nodes that form the basis of the Internet-of-Things results in new avenues of attack exploitable by adversaries to maliciously modify data captured by these nodes. In this work, we present a framework for detecting malicious hardware alterations that attempt to attack state-of-the-art microchips that form these sensor nodes. Specifically, we focus on extremely small Hardware Trojans (HTs) that attempt to modify sensor data right away as the data is received on a state-of-the-art chip fabricated in an untrusted facility. We present a dual-chip approach composed of an untrusted state-of-the-art prover chip and a trusted verifier chip, where the verifier continuously challenges the prover at run-time to ensure correct operation and assess the integrity of the captured data. Our preliminary analysis of the proposed mechanism shows that HT attacks anywhere on the untrusted state-of-the-art chip are detected and flagged preventing maliciously altered data to be transmitted out of the sensor node.

  • An MSB embedding approach to data integrity protection in a ubiquitous environment

    Verifying data integrity in a ubiquitous environment is challenging due to its features such as self-organised, data-centric, and dynamic topology control. In this paper, a method for protecting data integrity is present by inserting and extracting digital watermarking information into and from most significant bits (MSBs) of original data. The method has been implemented in a real ubiquitous environment, where 50 wireless ZigBee nodes were deployed and communicated using the MSB embedding method. Compared to other data integrity verification approaches, this method generates less traffic and more embedding capacity.

  • The application of cloud data integrity verification scheme in Internet of Things security

    With the development of IoT applications, the scale of IoT data is rapidly increasing. Relying on cloud computing to process IoT data becomes an inevitable choice of IoT data management. However, IoT data will get more and more security challenges and its data integrity verification needs are increasingly high to ensure security. This article is based on a realistic IoT application data integrity verification model, analyzed the IoT cloud storage data integrity verification needs, and through the analysis of existing cloud storage data integrity verification schemes, some exploration paths in lightweight data integrity verification and key security update are proposed.



Standards related to Data Integrity

Back to Top

IEEE Application Guide for Distributed Digital Control and Monitoring for Power Plants


IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications

The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...


IEEE Standard for Information Technology - POSIX Ada Language Interfaces - Part 1: Binding for System Application Program Interface (API)

This document is part of the POSIX series of standards for applications and user interfaces to open systems. It defines the Ada language bindings as package specifications and accompanying textual descriptions of the applications program interface (API). This standard supports application portability at the source code level through the binding between ISO 8652:1995 (Ada) and ISO/IEC 9945-1:1990 (IEEE Std 1003.1-1990 ...


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...