animated 发表于 2025-3-23 11:12:54

Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2files. One basic property of cryptographic Hash Functions is the avalanche effect that causes a significantly different output if an input is changed slightly. As some applications also need to identify similar files (e.g. spam/virus detection) this raised the need for .. In recent years, several ap

Charade 发表于 2025-3-23 16:29:57

Investigating File Encrypted Material Using NTFS $logfilef how to determine evidential value from it. This research is proposing a methodology for locating the original plaintext file that was encrypted on a hard disk drive. The technique also incorporates a method of determining the associated plaintext contents of the encrypted file. This is achieved by

制造 发表于 2025-3-23 20:26:07

http://reply.papertrans.cn/28/2794/279327/279327_13.png

ADAGE 发表于 2025-3-24 00:54:07

http://reply.papertrans.cn/28/2794/279327/279327_14.png

RADE 发表于 2025-3-24 04:06:02

https://doi.org/10.1007/978-3-642-39891-9algorithms; cloud computing; database forensics; encryption; mobile devices

蜿蜒而流 发表于 2025-3-24 07:53:21

978-3-642-39890-2ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

AVOW 发表于 2025-3-24 12:56:46

Marcus Rogers,Kathryn C. Seigfried-SpellarFast conference proceedings.State of the art report.Up to date results

escalate 发表于 2025-3-24 18:08:30

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/d/image/279327.jpg

indifferent 发表于 2025-3-24 20:33:06

http://reply.papertrans.cn/28/2794/279327/279327_19.png

BALE 发表于 2025-3-25 01:06:25

Digital Forensics and Cyber Crime978-3-642-39891-9Series ISSN 1867-8211 Series E-ISSN 1867-822X
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Digital Forensics and Cyber Crime; 4th International Co Marcus Rogers,Kathryn C. Seigfried-Spellar Conference proceedings 2013 ICST Institu