Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

File verification

Known as: Integrity checker, Verification 
File verification is the process of using an algorithm for verifying the integrity or authenticity of a computer file. This can be done by comparing… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
  • M. Basil, W. Adi
  • Sixth International Conference on Emerging…
  • 2015
  • Corpus ID: 17810683
Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2015
2015
Cloud computing deployment is gaining popularity among sensitive mission-critical sectors like the energy sector. Cloud computing… Expand
  • figure 2
  • table I
2012
2012
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 4
2008
2008
Wireless sensor networks (WSN) for health care systems are used to transmit large amount of data collected from several… Expand
Highly Cited
2004
Highly Cited
2004
Today, improving the security of computer systems has become an important and difficult problem. Attackers can seriously damage… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2004
2004
In this paper we develop an extended Ext3(XExt3) which means security enhanced file system. It can be used in generic Linux… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Highly Cited
2001
Highly Cited
2001
 
  • figure 4
Highly Cited
2001
Highly Cited
2001
Abstract : Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events… Expand
  • figure 4
Highly Cited
1994
Highly Cited
1994
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration… Expand
  • table 1
  • table 2