Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

File verification

Known as: Integrity checker, Verification 
File verification is the process of using an algorithm for verifying the integrity or authenticity of a computer file. This can be done by comparing… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Historically, hands-on cybersecurity exercises helped reinforce the basic cybersecurity concepts. However, most of them focused… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
2017
2017
We propose PowerAlert, an efficient external integrity checker for untrusted hosts. Current attestation systems suffer from… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 4
Is this relevant?
2008
2008
Wireless sensor networks (WSN) for health care systems are used to transmit large amount of data collected from several… Expand
Is this relevant?
2005
2005
Attackers who are able to compromise a single node in a high performance computing cluster can use that node as a launch point… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Today, improving the security of computer systems has become an important and difficult problem. Attackers can seriously damage… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2004
Review
2004
Gadi, Sowgandh Sunil. M.S.C.E. Department of Computer Science and Engineering, Wright State University, 2004. Security Hardened… Expand
  • figure 1.1
  • table 1.1
  • figure 2.1
  • figure 2.2
  • table 2.2
Is this relevant?
1996
1996
Many state-of-the-art ILP systems require large numbers of negative examples to avoid overgeneralization. This is a considerable… Expand
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
1994
Highly Cited
1994
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration… Expand
  • table 1
  • table 2
Is this relevant?
1994
1994
 
Is this relevant?