Cited By
View all- Crosby SWallach D(2009)Efficient data structures for tamper-evident loggingProceedings of the 18th conference on USENIX security symposium10.5555/1855768.1855788(317-334)Online publication date: 10-Aug-2009
This research proposes a novel technique for authenticating and validating syslogs for forensic analysis. This technique uses a modification of the Needham Schroeder protocol, which uses nonces (numbers used only once) and public keys. Syslogs, which ...
The generative and transformative nature of the Internet which has become a synonym for the infrastructure of the contemporary digital society, is also a place where there are unsavoury and illegal activities such as fraud, human trafficking, exchange ...
Collecting necessary digital and network forensics to prove the identity of an individual who is responsible for a crime, or suspected of a malicious attack, or has used a device during an incident, with minimum doubt to the court or other legitimate ...
IEEE Computer Society
United States