최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Procedia computer science, v.167, 2020년, pp.1334 - 1344
Yogesh, Patil Rachana (A.C. Patil College of Engineering) , R, Devane Satish (Datta Meghe College of Engineering)
Abstract The effect of digitization has led to an increased dependency on the internet. At the same time, cyber-attacks are on the rise due to this increased digitization. In cybercrime cases, digital evidence is of utmost importance. The forensic investigation process always begins after the incid...
Crimes in India 2018 National Crime Records Bureau
Journal of Digital Forensics, Security and Law Shah 12 2 12 2017 Protecting digital evidence integrity and preserving chain of custody.
osi, Jasmin, and Miroslav Baa. (2010) “(Im) proving chain of custody and digital evidence integrity with time stamp.” 33rd International Convention MIPRO: 1226-1230.
Koen, Renico, and Martin S. Olivier. (2008) “The Use of File Timestamps in Digital Forensics.” Information Security for South Africa (ISSA): 1-16.
International Journal of Digital Evidence Hosmer 1 1 1 2002 Proving the integrity of digital evidence with time.
Adams, Carlisle, Pat Cain, Denis Pinkas, and Robert Zuccherato. (2001) “Internet X. 509 public key infrastructure time-stamp protocol (TSP).” No. RFC 3161
Rubin, Aviel D., and Peter Honeyman. (1993) “Formal methods for the analysis of authentication protocols.” Center for Information Technology Integration.
10.1098/rspa.1989.0125 Burrows, Michael, Martin Abadi, and Roger Michael Needham. (1989) "A logic of authentication." Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences 426 (1871): 233-271.
“AVISPA. Automated Validation of Internet Security Protocols and Applications.” (2017) http://www.avispa-project.org/.
10.1007/11513988_27 Armando, Alessandro, David Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuellar, P. Hankes Drielsma et al. (2005) "The AVISPA tool for the automated validation of internet security protocols and applications." In International conference on computer aided verification: 281-285.
Von Oheimb, David. (2005) "The high-level protocol specification language HLPSL developed in the EU project AVISPA." In Proceedings of APPSEM 2005 workshop: 1-17.
Saillard, Ronan, and Thomas Genet. (2018) "CAS+” Available at http://people.irisa.fr/Thomas.Genet/span/CAS_manual.pdf.
Glouche, Yann, Thomas Genet, Olivier Heen, and Olivier Courtay. (2006) “A security protocol animator tool for AVISPA.” ARTIST2 workshop on security specification and verification of embedded systems
IEEE Transactions on information theory Dolev 29 2 198 1983 10.1109/TIT.1983.1056650 On the security of public key protocols.
International Journal of Information Security Basin 4 3 181 2005 10.1007/s10207-004-0055-7 OFMC: A symbolic model checker for security protocols.
10.1007/11805618_21 Turuani, Mathieu. (2006) "The CL-Atse protocol analyser." International Conference on Rewriting Techniques and Applications: 277-286.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.