Sciweavers

637 search results - page 11 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
SP
2005
IEEE
15 years 3 months ago
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data
Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, A...
ACSAC
2003
IEEE
15 years 2 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
ASIACRYPT
2003
Springer
15 years 2 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
VLDB
1987
ACM
55views Database» more  VLDB 1987»
15 years 27 days ago
Integrity Checking in Deductive Databases
Robert A. Kowalski, Fariba Sadri, Paul Soper