Checksum

Results: 137



#Item
11Cryptography / Computing / Information science / Cryptographic hash functions / Digital preservation / Records management / Error detection and correction / Digital technology / File Fixity / Checksum / BagIt / Preservation Metadata: Implementation Strategies

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2016-01-20 13:45:27
12

15 Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution TIELEI WANG and TAO WEI, Peking University GUOFEI GU, Texas A&M University WEI ZOU, Peking University

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2011-11-06 10:29:37
    13

    TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection Tielei Wang1,2 , Tao Wei1,2 , Guofei Gu3 , Wei Zou1,2∗ Laboratory of Network and Software Security Assurance (Peking Uni

    Add to Reading List

    Source URL: faculty.cs.tamu.edu

    Language: English - Date: 2010-03-05 09:52:30
      14

      31st IEEE Symposium on Security & Privacy TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection 1

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2011-06-14 14:11:41
        15

        USING CHECKSUM TOOL: Open checksum tool, select the file pull-down menu, and select “add files” Click on the file or files you want to select, then click the open button. The files should appear in the window. Open

        Add to Reading List

        Source URL: digitalcuration.umaine.edu

        - Date: 2015-09-30 18:52:04
          16

          Pt-table-checksum Pt-table-sync 测试库以及测试表 $mysql07 Warning: Using a password on the command line interface can be insecure. Welcome to the MySQL monitor. Commands end with ; or \g.

          Add to Reading List

          Source URL: www.vmcd.org

          Language: English - Date: 2015-08-18 22:48:29
            17Fuzz testing / Software testing / Sum / Checksum / Transmission Control Protocol / Tar / MD5 / Adler-32 / Cksum / Computing / Software / System software

            TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

            Add to Reading List

            Source URL: oakland10.cs.virginia.edu

            Language: English - Date: 2010-05-20 11:30:55
            18X86 assembly language / Accumulator / Transmission Control Protocol / X86-64 / Checksum / MOV / Ping / X86 / Spinlock / Computer architecture / Computing / X86 architecture

            New Results for Timing-Based Attestation

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2012-05-22 01:34:12
            19Information technology management / Cryptographic protocols / Cryptographic hash functions / EDIFACT / X.509 / Crypt / Public key certificate / SHA-2 / Checksum / Cryptography / Electronic commerce / Public-key cryptography

            SCTS-SC Appendix C Codelists Version

            Add to Reading List

            Source URL: www.tullverket.se

            Language: English - Date: 2013-06-12 06:23:19
            20Checksum / NTFS / Information science / Computing / Hashing / Information retrieval / Cryptography / Search algorithms / Error detection and correction / Hash function

            Jim  Lyle   National  Institute  of  Standards  and  Technology   Disclaimer    Certain  trade  names  and  company  products  are   mentioned  in  the  text

            Add to Reading List

            Source URL: www.cftt.nist.gov

            Language: English - Date: 2010-09-16 15:17:26
            UPDATE