Skip to search formSkip to main contentSkip to account menu

Checksum

Known as: Check-sum, Modular sum, Checksums 
A checksum is a small-sized datum from a block of digital data for the purpose of detecting errors which may have been introduced during its… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools… 
Highly Cited
2006
Highly Cited
2006
Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify… 
Highly Cited
2005
Highly Cited
2005
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does… 
Highly Cited
2004
Highly Cited
2004
We expect a future where we are surrounded by embedded devices, ranging from Java-enabled cell phones to sensor networks and… 
Highly Cited
2003
Highly Cited
2003
We have designed and implemented the Google File System, a scalable distributed file system for large distributed data-intensive… 
Highly Cited
1998
Highly Cited
1998
This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and… 
Highly Cited
1995
Highly Cited
1995
The classic guide to network securityi¾–now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet… 
Highly Cited
1991
Highly Cited
1991
Part 1 Basic: introduction protocol structure error control flow control. Part 2 Specification and modeling: validation models… 
Highly Cited
1980
Highly Cited
1980
UDP does not guarantee reliability or ordering in the way that TCP does. Datagrams may arrive out of order, appear duplicated, or…