-
2
-
-
0036216396
-
The benefits of a notification process in addressing the worsening computer virus problems: Results of a survey and a simulation model
-
J.L. Aron, M. O'leary, A.R. Gove, S. Azadegan, and M.C. Schneider The benefits of a notification process in addressing the worsening computer virus problems: results of a survey and a simulation model Computers & Security 21 2 2002
-
(2002)
Computers & Security
, vol.21
, Issue.2
-
-
Aron, J.L.1
O'Leary, M.2
Gove, A.R.3
Azadegan, S.4
Schneider, M.C.5
-
3
-
-
84995657580
-
Fast and secure distributed read-only file system
-
San Diego, CA, October
-
K. Fu, M.F. Kaashoek, D. Mazieres, Fast and secure distributed read-only file system, in: Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, San Diego, CA, October 2000.
-
(2000)
Proceedings of the Fourth Symposium on Operating Systems Design and Implementation
-
-
Fu, K.1
Kaashoek, M.F.2
Mazieres, D.3
-
4
-
-
21644442749
-
A new approach to archival storage
-
Monterey, CA, January
-
S. Quinlan, S. Dorward, A new approach to archival storage, in: Proceedings of First USENIX Conference on File and Storage Technology, Monterey, CA, January 2002.
-
(2002)
Proceedings of First USENIX Conference on File and Storage Technology
-
-
Quinlan, S.1
Dorward, S.2
-
5
-
-
15944403277
-
An investigator's guide to file system internals
-
Hawaii, United States, June
-
B. Carrier, An investigator's guide to file system internals, in: First Conference in Computer Security, Incident Handling and Response, Hawaii, United States, June, 2002.
-
(2002)
First Conference in Computer Security, Incident Handling and Response
-
-
Carrier, B.1
-
7
-
-
33244463401
-
A new hashing package for UNIX
-
Dallas, TX, January
-
M. Seltzer, O. Yigit, A new hashing package for UNIX, in: Proceedings of the Winter USENIX Technical Conference, Dallas, TX, January 1991.
-
(1991)
Proceedings of the Winter USENIX Technical Conference
-
-
Seltzer, M.1
Yigit, O.2
-
8
-
-
27144515662
-
NCryptfs: A secure and convenient crypto graphic file system
-
San Antonio, TX, June
-
C.P. Wright, M. Martino, E. Zadoc, NCryptfs: a secure and convenient crypto graphic file system, in: Proceedings of the Annual USENIX Technical Conference, San Antonio, TX, June, 2003.
-
(2003)
Proceedings of the Annual USENIX Technical Conference
-
-
Wright, C.P.1
Martino, M.2
Zadoc, E.3
-
10
-
-
11444256799
-
-
Network Working Group Request for Comments (RFC), 1071, September
-
R. Braden, D. Borman, C. Partridge, Computing the internet checksum, Network Working Group Request for Comments (RFC), 1071, September 1988.
-
(1988)
Computing the Internet Checksum
-
-
Braden, R.1
Borman, D.2
Partridge, C.3
-
11
-
-
57849150156
-
Network architecture: Hamming codes and cyclic redundancy for transmission error correction
-
S.J. Chung Network architecture: hamming codes and cyclic redundancy for transmission error correction ACM 33 4 2001
-
(2001)
ACM
, vol.33
, Issue.4
-
-
Chung, S.J.1
-
12
-
-
57849086637
-
OS environment backup technology (RAID-1, standby disk series, pre-install image on HDD)
-
W. Toshihiro, S. Takahisa, Y. Hiroyuki, and K. Koji OS environment backup technology (RAID-1, standby disk series, pre-install image on HDD) NEC Technical Journal 56 6 2003
-
(2003)
NEC Technical Journal
, vol.56
, Issue.6
-
-
Toshihiro, W.1
Takahisa, S.2
Hiroyuki, Y.3
Koji, K.4
-
14
-
-
57849139290
-
An Oblique-matrix technique for data integrity assurance
-
J.A. Ghaeb, and J. Chebil An Oblique-matrix technique for data integrity assurance Elsevier, Computer and security 28 12 2009
-
(2009)
Elsevier, Computer and Security
, vol.28
, Issue.2
-
-
Ghaeb, J.A.1
Chebil, J.2
-
15
-
-
34247614499
-
Dual-level key management for secure grid communication in dynamic and hierarchical groups
-
X. Zou, Y. Dai, and X. Ran Dual-level key management for secure grid communication in dynamic and hierarchical groups Future Generation Computer Systems 23 6 2007
-
(2007)
Future Generation Computer Systems
, vol.23
, Issue.6
-
-
Zou, X.1
Dai, Y.2
Ran, X.3
-
17
-
-
33750303836
-
An efficient image authentication method based on hamming code
-
C. Chi-Shiang, and C. Chin-Chen An efficient image authentication method based on hamming code Elsevier Pattern Recognition 40 2 2007 681 690
-
(2007)
Elsevier Pattern Recognition
, vol.40
, Issue.2
, pp. 681-690
-
-
Chi-Shiang, C.1
Chin-Chen, C.2
-
18
-
-
16244387176
-
A performance evaluation tool for RAID disk arrays
-
Proceedings - First International Conference on the Quantitative Evaluation of Systems, QEST 2004
-
A. Thomasian, C. Han, G. Fu, A performance tool for RAID disk arrays, in: Proc. Quantitative Evaluation of System, QEST'04, Netherlands, 2004, pp. 817. (Pubitemid 40456758)
-
(2004)
Proceedings - First International Conference on the Quantitative Evaluation of Systems, QEST 2004
, pp. 8-17
-
-
Thomasian, A.1
Han, C.2
Fu, G.3
Liu, C.4
|