Author of the publication

Using Checksums to Detect Data Corruption.

, , and . EDBT, volume 1777 of Lecture Notes in Computer Science, page 136-149. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meta-models for misuse cases., , and . CSIIRW, page 33. ACM, (2009)The Role of Tech Corporations at Historically Black Colleges and Universities in American STEM Education., , , and . AMCIS, Association for Information Systems, (2018)Protecting File systems Against Corruption Using Checksums., , and . DBSec, volume 201 of IFIP Conference Proceedings, page 113-124. Kluwer, (2000)Using Checksums to Detect Data Corruption., , and . EDBT, volume 1777 of Lecture Notes in Computer Science, page 136-149. Springer, (2000)Location-Based Lightweight Security Scheme for Wireless Communications in ROAR Architecture., , , , and . SmartCloud, page 155-160. IEEE Computer Society, (2017)PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents., , , and . VTC Spring, page 2550-2554. IEEE, (2007)Communications Based Positive Train Control Systems Architecture in the USA., , and . VTC Spring, page 2987-2991. IEEE, (2006)Research Directions in Quantum Cryptography., , and . ITNG, page 779-784. IEEE Computer Society, (2007)A Framework for Investigating Railroad Accidents., , and . IFIP Int. Conf. Digital Forensics, volume 242 of IFIP, page 255-265. Springer, (2007)Protection and Recovery of Railroad Event Recorder Data., , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 247-260. Springer, (2008)