Doug Varney - Academia.edu (original) (raw)

Doug Varney

Uploads

Papers by Doug Varney

Research paper thumbnail of Need for PSTN Internet Notification (PIN) ServiceA Proposal for a new Working Groups

Research paper thumbnail of Adequacy of checksum algorithms for computer virus detection

ACM SIGSMALL/PC Notes, 1991

Checksums, long used for random error detection in communications, is now being employed to detec... more Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [POZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to "fool" the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.

Research paper thumbnail of Network interconnect backup

Research paper thumbnail of Need for PSTN Internet Notification (PIN) ServiceA Proposal for a new Working Groups

Research paper thumbnail of Adequacy of checksum algorithms for computer virus detection

ACM SIGSMALL/PC Notes, 1991

Checksums, long used for random error detection in communications, is now being employed to detec... more Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [POZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to "fool" the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.

Research paper thumbnail of Network interconnect backup

Log In