Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,823,326 papers from all fields of science
Search
Sign In
Create Free Account
Checksum
Known as:
Check-sum
, Modular sum
, Checksums
Expand
A checksum is a small-sized datum from a block of digital data for the purpose of detecting errors which may have been introduced during its…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
50 relations
Adler-32
Analysis of algorithms
Authentication
BATON
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
J. Dykstra
,
A. Sherman
Digit. Investig.
2012
Corpus ID: 13974851
Highly Cited
2010
Highly Cited
2010
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
Tielei Wang
,
Tao Wei
,
G. Gu
,
Wei Zou
IEEE Symposium on Security and Privacy
2010
Corpus ID: 11898088
Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools…
Expand
Highly Cited
2006
Highly Cited
2006
Cooperative Security for Network Coding File Distribution
Christos Gkantsidis
,
P. Rodriguez
Proceedings IEEE INFOCOM . 25TH IEEE…
2006
Corpus ID: 2046906
Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify…
Expand
Highly Cited
2005
Highly Cited
2005
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
Arvind Seshadri
,
M. Luk
,
E. Shi
,
A. Perrig
,
L. V. Doorn
,
P. Khosla
SOSP '05
2005
Corpus ID: 9960430
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does…
Expand
Highly Cited
2004
Highly Cited
2004
SWATT: softWare-based attestation for embedded devices
Arvind Seshadri
,
A. Perrig
,
L. V. Doorn
,
P. Khosla
IEEE Symposium on Security and Privacy…
2004
Corpus ID: 1771599
We expect a future where we are surrounded by embedded devices, ranging from Java-enabled cell phones to sensor networks and…
Expand
Highly Cited
2003
Highly Cited
2003
The Google file system
S. Ghemawat
,
H. Gobioff
,
Shun-Tak Leung
SOSP '03
2003
Corpus ID: 221261373
We have designed and implemented the Google File System, a scalable distributed file system for large distributed data-intensive…
Expand
Highly Cited
1998
Highly Cited
1998
Internet Security Association and Key Management Protocol (ISAKMP)
W. D. Maughan
,
Mark Schertler
,
Mark Schneider
,
Jeff Turner
RFC
1998
Corpus ID: 27376202
This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and…
Expand
Highly Cited
1995
Highly Cited
1995
Network security - private communication in a public world
C. Kaufman
,
R. Perlman
,
M. Speciner
Prentice Hall series in computer networking and…
1995
Corpus ID: 37316854
The classic guide to network securityi¾now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet…
Expand
Highly Cited
1991
Highly Cited
1991
Design and validation of computer protocols
G. Holzmann
1991
Corpus ID: 61218849
Part 1 Basic: introduction protocol structure error control flow control. Part 2 Specification and modeling: validation models…
Expand
Highly Cited
1980
Highly Cited
1980
User Datagram Protocol
J. Postel
RFC
1980
Corpus ID: 32952415
UDP does not guarantee reliability or ordering in the way that TCP does. Datagrams may arrive out of order, appear duplicated, or…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE