Sciweavers

173 search results - page 12 / 35
» Computer Forensics in Forensis
Sort
View
156
Voted
AVBPA
2005
Springer
228views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition
Abstract. In this paper, the use of biometric systems in forensic applications is reviewed. Main differences between the aim of commercial biometric systems and forensic reporting...
Daniel Ramos-Castro, Joaquin Gonzalez-Rodriguez, C...
160
Voted
IACR
2011
116views more  IACR 2011»
14 years 3 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev
117
Voted
RAID
1999
Springer
15 years 8 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
127
Voted
IEEEIAS
2007
IEEE
15 years 10 months ago
Computational Forensics: Towards Hybrid-Intelligent Crime Investigation
In recent years, mathematical, statistical and computer science methods have found extensive application in developing new procedures for crime investigation, prosecution and the ...
Katrin Franke, Sargur N. Srihari