Sciweavers

Share
27 search results - page 1 / 6
» Practical Approaches to Recovering Encrypted Digital Evidenc...
Sort
View
IJDE
2002
82views more  IJDE 2002»
11 years 7 months ago
Practical Approaches to Recovering Encrypted Digital Evidence
As more criminals use encryption to conceal incriminating evidence, forensic examiners require practical methods for recovering some or all of the encrypted data. This paper prese...
Eoghan Casey
EUROCRYPT
2006
Springer
11 years 11 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
JDFP
2006
139views more  JDFP 2006»
11 years 8 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
ESORICS
2009
Springer
12 years 8 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
12 years 15 days ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
books