Protecting Digital Evidence Integrity and Preserving Chain of Custody
暂无分享,去创建一个
[1] Marc Stevens,et al. Fast Collision Attack on MD5 , 2006, IACR Cryptol. ePrint Arch..
[2] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[3] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[4] Oliver Popov,et al. Protecting Digital Evidence Integrity by Using Smart Cards , 2010, ICDF2C.
[5] Oliver Popov,et al. Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles , 2014, KES.
[6] Sangjin Lee,et al. Digital evidence collection process in integrity and memory information gathering , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).