Skip to search formSkip to main contentSkip to account menu

File verification

Known as: Integrity checker, Verification 
File verification is the process of using an algorithm for verifying the integrity or authenticity of a computer file. This can be done by comparing… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
With the widespread popularity of the outsourcing of streaming client data in the cloud infrastructure, lot of individuals or… 
2016
2016
Perkembangan teknologi informasi yang semakin melesat dewasa ini memberikan kemudahan bagi siapa saja dalam melakukan pertukaran… 
2016
2016
Many modern electronic systems like PDAs, cell phones, network routers, smart cards, and networked sensors are in need to access… 
2015
2015
Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures… 
2013
2013
The Limited Local Memory (LLM) machine architecture is proposed to improve the security on a multi-core processor with a small… 
2012
2012
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot… 
2012
2012
We have designed a novel system called a Secure Integrity Measurement System (SIMS) to provide a practical integrity for flexible… 
2005
2005
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-in-time copy… 
2004
2004
In this paper we develop an extended Ext3(XExt3) which means security enhanced file system. It can be used in generic Linux… 
2000
2000
Abstract : The key to achieving information dominance by the US armed forces is the transmittal of accurate and timely…