-
1
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom BH. Space/time trade-offs in hash coding with allowable errors. Commun ACM 1970;13:422-6.
-
(1970)
Commun ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
2
-
-
84982802386
-
Similarity preserving hashing: Eligible properties and a new algorithm mrsh-v2
-
In: Rogers M, Seigfried-Spellar K, editors.. Berlin Heidelberg: Springer
-
Breitinger F, Baier H. Similarity preserving hashing: eligible properties and a new algorithm mrsh-v2. In: Rogers M, Seigfried-Spellar K, editors. Digital forensics and cyber crime. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, vol. 114. Berlin Heidelberg: Springer; 2013. pp. 167-82.
-
(2013)
Digital Forensics and Cyber Crime. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.114
, pp. 167-182
-
-
Breitinger, F.1
Baier, H.2
-
4
-
-
84899649504
-
Towards a process model for hash functions in digital forensics
-
Breitinger F, Liu H, Winter C, Baier H, Rybalchenko A, Steinebach M. Towards a process model for hash functions in digital forensics. In: 5th International Conference on Digital Forensics & Cyber Crime; 2013a.
-
(2013)
5th International Conference on Digital Forensics & Cyber Crime
-
-
Breitinger, F.1
Liu, H.2
Winter, C.3
Baier, H.4
Rybalchenko, A.5
Steinebach, M.6
-
7
-
-
70450232823
-
Network applications of bloom filters: A survey
-
Broder A, Mitzenmacher M. Network applications of bloom filters: a survey. Internet Math 2005;1:485-509.
-
(2005)
Internet Math
, vol.1
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
8
-
-
0003629991
-
-
Technical Report National Institute of Standards and Technologies, Federal Information Processing Standards Publication
-
Gallagher P, Director A. Secure Hash Standard (SHS). Technical Report National Institute of Standards and Technologies, Federal Information Processing Standards Publication; 1995. pp. 180-1.
-
(1995)
Secure Hash Standard (SHS)
, pp. 180-181
-
-
Gallagher, P.1
Director, A.2
-
9
-
-
33746191665
-
Identifying almost identical files using context triggered piecewise hashing
-
Kornblum J. Identifying almost identical files using context triggered piecewise hashing. Digit Investig 2006;3:91-7.
-
(2006)
Digit Investig
, vol.3
, pp. 91-97
-
-
Kornblum, J.1
-
10
-
-
0025432881
-
Optimal semijoins for distributed database systems
-
Mullin J. Optimal semijoins for distributed database systems. IEEE Trans Softw Eng 1990;16:558-60.
-
(1990)
IEEE Trans Softw Eng
, vol.16
, pp. 558-560
-
-
Mullin, J.1
-
11
-
-
84899641270
-
-
NIST Information Technology Laboratory. National software reference library
-
NIST Information Technology Laboratory. National software reference library http://www.nsrl.nist.gov; 2013.
-
(2013)
-
-
-
12
-
-
84881268526
-
-
Noll LC. Fnv hash. http://www.isthe.com/chongo/tech/comp/fnv/index.html; 1994-2012.
-
(1994)
Fnv Hash
-
-
Noll, L.C.1
-
14
-
-
84868524967
-
An evaluation of forensic similarity hashes
-
Roussev V. An evaluation of forensic similarity hashes. Digit Investig 2011;8:34-41.
-
(2011)
Digit Investig
, vol.8
, pp. 34-41
-
-
Roussev, V.1
-
15
-
-
84872696748
-
Managing terabyte-scale investigations with similarity digests
-
In: Peterson G, Shenoi S, editors.. Berlin Heidelberg: Springer
-
Roussev V. Managing terabyte-scale investigations with similarity digests. In: Peterson G, Shenoi S, editors. Advances in digital forensics VIII. IFIP advances in information and communication technology, vol. 383. Berlin Heidelberg: Springer; 2012. pp. 19-34.
-
(2012)
Advances in Digital Forensics VIII. IFIP Advances in Information and Communication Technology
, vol.383
, pp. 19-34
-
-
Roussev, V.1
-
17
-
-
84881301156
-
-
Accessed 29.11.13
-
Tridgell A. spamsum. http://www.samba.org/ftp/unpacked/junkcode/spamsum/; 2002-2009. Accessed 29.11.13.
-
(2002)
Spamsum
-
-
Tridgell, A.1
-
18
-
-
84889096979
-
F2s2: Fast forensic similarity search through indexing piecewise hash signatures
-
Winter C, Schneider M, Yannikos Y. F2s2: fast forensic similarity search through indexing piecewise hash signatures. Digit Investig 2013; 10(4):361-71.
-
(2013)
Digit Investig
, vol.10
, Issue.4
, pp. 361-371
-
-
Winter, C.1
Schneider, M.2
Yannikos, Y.3
|