Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,570,964 papers from all fields of science
Search
Sign In
Create Free Account
File verification
Known as:
Integrity checker
, Verification
File verification is the process of using an algorithm for verifying the integrity or authenticity of a computer file. This can be done by comparing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
.dwg
Algorithm
Authentication
Backdoor (computing)
Expand
Broader (1)
Error detection and correction
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Novel Third Party Integrity Checker (TPIC) based Data Auditing for Security of the Dynamic Streaming Client Data in a Cloud Infrastructure
K. P. Rao
,
R. P. Puneeth
,
Shashank Shetty
International Conference on Electrical…
2018
Corpus ID: 211243420
With the widespread popularity of the outsourcing of streaming client data in the cloud infrastructure, lot of individuals or…
Expand
2016
2016
Implementasi Algoritma Rc4a Dan Md5 Untuk Menjamin Confidentiality Dan Integrity Pada File Teks
N. Hayati
,
Mohammad Andri Budiman
,
Amer Sharif
2016
Corpus ID: 64740209
Perkembangan teknologi informasi yang semakin melesat dewasa ini memberikan kemudahan bagi siapa saja dalam melakukan pertukaran…
Expand
2016
2016
Hardware based MD5 implementation using VHDL for secured embedded and VLSI based designs
I. Landge
,
B. Mishra
International Conference on Communication and…
2016
Corpus ID: 30371809
Many modern electronic systems like PDAs, cell phones, network routers, smart cards, and networked sensors are in need to access…
Expand
2015
2015
Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding
M. Basil
,
W. Adi
International Conference on Emerging Security…
2015
Corpus ID: 17810683
Hash functions are widely deployed in many cryptographic applications, such as message integrity checks, digital signatures…
Expand
2013
2013
Local-Memory-Based Integrity Checking for Embedded Systems
Ning Li
,
T. Nakajima
IEEE International Conference on Computational…
2013
Corpus ID: 16326327
The Limited Local Memory (LLM) machine architecture is proposed to improve the security on a multi-core processor with a small…
Expand
2012
2012
Architecture Support for Dynamic Integrity Checking
A. Kanuparthi
,
M. Zahran
,
R. Karri
IEEE Transactions on Information Forensics and…
2012
Corpus ID: 9829300
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot…
Expand
2012
2012
Testing and evaluation of a secure integrity measurement system (SIMS) for remote systems
Shadi A. Aljawarneh
,
Abdullah Alhaj
˜The œinternational Arab journal of information…
2012
Corpus ID: 1775341
We have designed a novel system called a Secure Integrity Measurement System (SIMS) to provide a practical integrity for flexible…
Expand
2005
2005
Storage-based file system integrity checker
M. Banikazemi
,
D. Poff
,
B. Abali
ACM International Workshop on Storage Security…
2005
Corpus ID: 10778234
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-in-time copy…
Expand
2004
2004
XExt 3 : The Design and Implementation of a Security Enhanced Ext 3 File System
Ji-Ho Cho
,
D. Yoo
,
Hyung-Chan Kim
,
R. Ramakrishna
,
K. Sakurai
2004
Corpus ID: 6322089
In this paper we develop an extended Ext3(XExt3) which means security enhanced file system. It can be used in generic Linux…
Expand
2000
2000
Self-Checking Software for Information Assurance
T. Reinhart
,
C. Boettcher
,
R. Gotfried
,
Mark J. Kuckelman
2000
Corpus ID: 53920275
Abstract : The key to achieving information dominance by the US armed forces is the transmittal of accurate and timely…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE