메뉴 건너뛰기




Volumn 7, Issue 2, 2009, Pages 49-55

Hashing and data fingerprinting in digital forensics

Author keywords

Digital forensics; Fingerprinting; Hashing; Security

Indexed keywords

BINARY DATUM; CRYPTOGRAPHIC HASH FUNCTIONS; DATA INTEGRITIES; DIGITAL FORENSICS; FILE SYSTEMS; FINGERPRINTING; HASHING; HASHING ALGORITHMS; HIGH THROUGHPUTS; JPEG FILES; MEMORY EFFICIENCIES; SECURITY; TRACE EVIDENCES; UNIVERSAL HASHES;

EID: 65249129028     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.40     Document Type: Article
Times cited : (46)

References (19)
  • 2
    • 65249122989 scopus 로고    scopus 로고
    • Regional Computer Forensics Laboratory Program Annual Report FY2007, US Federal Bureau of Investigation, 2007; www.rcfl.gov/downloads/ documents/RCFL-Nat -Ammal07.pdf.
    • Regional Computer Forensics Laboratory Program Annual Report FY2007, US Federal Bureau of Investigation, 2007; www.rcfl.gov/downloads/ documents/RCFL-Nat -Ammal07.pdf.
  • 3
    • 84868929483 scopus 로고    scopus 로고
    • DOD Seized 60TB in Search for Iraq Battle Plan Leak
    • Australia, 31 Jan. 2005;
    • P. Roberts, "DOD Seized 60TB in Search for Iraq Battle Plan Leak," Computerworld (Australia), 31 Jan. 2005; www.computerworld. com.au/index.php/id;266473746.
    • Computerworld
    • Roberts, P.1
  • 4
    • 65249092425 scopus 로고    scopus 로고
    • RCFL Program Annual Report for Fiscal Year 2006, US Federal Bureau of Investigation, 2006; www.rcfl.gov/ downloads/documents/RCFL-Nat-Ammal06.pdf.
    • RCFL Program Annual Report for Fiscal Year 2006, US Federal Bureau of Investigation, 2006; www.rcfl.gov/ downloads/documents/RCFL-Nat-Ammal06.pdf.
  • 5
    • 0014814325 scopus 로고
    • Space/Time Tradeoffs in Hash Coding with Allowable Errors
    • B. Bloom, "Space/Time Tradeoffs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, no. 7, 1970, pp. 422-426.
    • (1970) Comm. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 7
    • 0003676885 scopus 로고
    • Fingerprinting by Random Polynomials
    • 15-81, Center lor Research in Computing Technology, Harvard Univ
    • M.O. Rabin, Fingerprinting by Random Polynomials, tech. report 15-81, Center lor Research in Computing Technology, Harvard Univ., 1981.
    • (1981) tech. report
    • Rabin, M.O.1
  • 8
    • 0022030599 scopus 로고
    • Efficient Raudomized Pattern-Matching Algorithms
    • R. Karp and M. Rabin, "Efficient Raudomized Pattern-Matching Algorithms," IBM J. Research and Development, vol. 31, no. 2, 1987, pp. 249-260.
    • (1987) IBM J. Research and Development , vol.31 , Issue.2 , pp. 249-260
    • Karp, R.1    Rabin, M.2
  • 9
    • 85043988965 scopus 로고
    • Finding Similar Files in a Large File System
    • Usenix Assoc
    • U. Manber, "Finding Similar Files in a Large File System," Proc. Usenix Winter 1994 Technical Conf., Usenix Assoc, 1994, pp. 1-10.
    • (1994) Proc. Usenix Winter 1994 Technical Conf , pp. 1-10
    • Manber, U.1
  • 12
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward Automated, Distributed Worm Signature Detection
    • Usenix Assoc
    • H. Kim and B. Karp, "Autograph: Toward Automated, Distributed Worm Signature Detection," Proc. 13th Usenix Security Symp., Usenix Assoc, 2004, pp. 271-286.
    • (2004) Proc. 13th Usenix Security Symp , pp. 271-286
    • Kim, H.1    Karp, B.2
  • 14
    • 33845543472 scopus 로고    scopus 로고
    • Network Forensics on Packet Fingerprints
    • Springer
    • C.Y. Cho et al., "Network Forensics on Packet Fingerprints," Security and Privacy in Dynamic Environments, Springer, 2006, pp. 401-412.
    • (2006) Security and Privacy in Dynamic Environments , pp. 401-412
    • Cho, C.Y.1
  • 17
    • 52249094557 scopus 로고    scopus 로고
    • Identifying Almost Identical Files Using Context Triggered Piecewise Hashing
    • Elsevier
    • J. Kornblum, "Identifying Almost Identical Files Using Context Triggered Piecewise Hashing," 'Proc. 6th Ann. Digital Forensics Research Workshop Conf. (DFRWS 06), Elsevier, 2006, pp. S91-S97; www.dfrws.org/2006/ proceedings/12-Kornblum.pdf.
    • (2006) Proc. 6th Ann. Digital Forensics Research Workshop Conf. (DFRWS 06)
    • Kornblum, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.