Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation
暂无分享,去创建一个
Siu-Ming Yiu | Tetsutaro Uehara | Ryôichi Sasaki | Shuhui Hou | R. Sasaki | S. Yiu | T. Uehara | Shuhui Hou
[1] 山村 明弘. Asymmetric secret key ciphers and encrypted data retrieval schemes(Algebras, Languages, Computations and their Applications) , 2007 .
[2] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[3] Siu-Ming Yiu,et al. Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation , 2013, ICT-EurAsia.
[4] Tetsutaro Uehara,et al. Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[5] Chet Hosmer. Proving the Integrity of Digital Evidence with Time , 2002, Int. J. Digit. EVid..
[6] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[7] Yunhyong Kim,et al. Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving , 2012, Int. J. Digit. Curation.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Siu-Ming Yiu,et al. Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[10] Ali Dehghantanha,et al. A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS , 2014 .