Protecting Digital Evidence Integrity by Using Smart Cards
暂无分享,去创建一个
[1] Tom Killalea,et al. Guidelines for Evidence Collection and Archiving , 2002, RFC.
[2] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[3] Marc Stevens,et al. Fast Collision Attack on MD5 , 2006, IACR Cryptol. ePrint Arch..
[4] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[5] Jian Guo,et al. Preimages for Step-Reduced SHA-2 , 2009, IACR Cryptol. ePrint Arch..
[6] Sangjin Lee,et al. Digital evidence collection process in integrity and memory information gathering , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).