Digital evidence protection model with batch-verifying and public verifiability for computer forensics

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The traditional integrity protection of evidence currently available only accounts for the entire time between seizure and presentation. Few people focus their eyes on the time before seizure. Here, through analyzing in detail the relation between digital evidence and intrusion process, a digital evidence protection model with batch-verifying and public verifiability is proposed to protect the generated digital evidence in time. The new protection model can reasonably account for the entire time between generation and presentation. The digital evidence based on the new model is valid and acceptable. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Qi, Z. H., Gao, Z. F., Shen, Y. M., & Han, B. X. (2013). Digital evidence protection model with batch-verifying and public verifiability for computer forensics. In Advances in Intelligent Systems and Computing (Vol. 180 AISC, pp. 237–242). Springer Verlag. https://doi.org/10.1007/978-3-642-31656-2_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free