Digital Evidence and Investigatory Protocols

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...

متن کامل

Privacy Protecting Protocols for Revocable Digital Signatures

Consider an application where a human user has to digitally sign a message. It is usually assumed that she has a trusted computer at her disposal, however, this assumption does not hold in several practical cases, especially if the user is mobile. Smart cards have been proposed to solve this problem, but they do not have a user interface, therefore the user still needs a (potentially untrusted)...

متن کامل

Blind Signature Protocols from Digital Signature Standards

Using Russian digital signature (DS) standards as the underlying scheme there are designed the blind DS protocols that are the first known implementation of the blind DS based on signature standards. There are also proposed blind collective DS protocols based on the DS standards. The last protocols are also the first implementation of the blind multi-signature schemes using the signature verifi...

متن کامل

Digital Signatures from Challenge-Divided Σ-Protocols

Digital signature is one of the basic primitives in cryptography. A common paradigm of obtaining signatures, known as the Fiat-Shamir (FS) paradigm, is to collapse any Σ-protocol (which is 3-round public-coin honest-verifier zero-knowledge) into a non-interactive scheme with hash functions that are modeled to be random oracles (RO). The Digital Signature Standard (DSS) and Schnorr’s signature s...

متن کامل

Unification of Digital Evidence from Disparate Sources (Digital Evidence Bags)

This paper outlines a new approach to the acquisition and processing of digital evidence obtained from disparate digital devices and sources. To date the capture of digital based evidence has always been in its entirety from the source device and different methods and containers (file types) are used for different types of digital device (e.g. computer, PDA, mobile phone). This paper defines a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Evidence and Electronic Signature Law Review

سال: 2014

ISSN: 2054-8508,1756-4611

DOI: 10.14296/deeslr.v11i0.2131