Doug Varney - Profile on Academia.edu (original) (raw)

Doug Varney

Beat Signer related author profile picture

Alberto Pimpinelli related author profile picture

Armando Marques-Guedes related author profile picture

Fatiha  Djemili Tolba related author profile picture

Lev Manovich related author profile picture

Lev Manovich

Graduate Center of the City University of New York

Dr. Shadab Alam related author profile picture

Journal of Computer Science IJCSIS related author profile picture

Professor Dr. Loutfy H . Madkour related author profile picture

Pedro de Andres related author profile picture

Pedro de Andres

CSIC (Consejo Superior de Investigaciones Científicas-Spanish National Research Council)

Ashok Paranjothi related author profile picture

Uploads

Papers by Doug Varney

Research paper thumbnail of Need for PSTN Internet Notification (PIN) ServiceA Proposal for a new Working Groups

Need for PSTN Internet Notification (PIN) ServiceA Proposal for a new Working Groups

Research paper thumbnail of Adequacy of checksum algorithms for computer virus detection

ACM SIGSMALL/PC Notes, 1991

Checksums, long used for random error detection in communications, is now being employed to detec... more Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [POZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to "fool" the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.

Research paper thumbnail of Network interconnect backup

Network interconnect backup

Research paper thumbnail of Need for PSTN Internet Notification (PIN) ServiceA Proposal for a new Working Groups

Need for PSTN Internet Notification (PIN) ServiceA Proposal for a new Working Groups

Research paper thumbnail of Adequacy of checksum algorithms for computer virus detection

ACM SIGSMALL/PC Notes, 1991

Checksums, long used for random error detection in communications, is now being employed to detec... more Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [POZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to "fool" the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.

Research paper thumbnail of Network interconnect backup

Network interconnect backup

Log In