Skip to search formSkip to main contentSkip to account menu

File verification

Known as: Integrity checker, Verification 
File verification is the process of using an algorithm for verifying the integrity or authenticity of a computer file. This can be done by comparing… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Historically, hands-on cybersecurity exercises helped reinforce the basic cybersecurity concepts. However, most of them focused… 
2012
2012
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot… 
2005
2005
Attackers who are able to compromise a single node in a high performance computing cluster can use that node as a launch point… 
Highly Cited
2004
Highly Cited
2004
Today, improving the security of computer systems has become an important and difficult problem. Attackers can seriously damage… 
Highly Cited
2003
Highly Cited
2003
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input… 
Highly Cited
2001
Highly Cited
2001
Highly Cited
2001
Highly Cited
2001
Abstract : Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events… 
Review
1996
Review
1996
Intrusion detection is a significant focus of research in the security of computer systems and networks. This paper presents an… 
Review
1994
Review
1994
Tripwire is an integrity checking program written for the UNIX environment. It gives system administrators the ability to monitor… 
Highly Cited
1994
Highly Cited
1994
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration…