Sciweavers

173 search results - page 12 / 35
» Computer Forensics in Forensis
Sort
View
AVBPA
2005
Springer
228views Biometrics» more  AVBPA 2005»
14 years 3 months ago
Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition
Abstract. In this paper, the use of biometric systems in forensic applications is reviewed. Main differences between the aim of commercial biometric systems and forensic reporting...
Daniel Ramos-Castro, Joaquin Gonzalez-Rodriguez, C...
IACR
2011
116views more  IACR 2011»
12 years 9 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev
RAID
1999
Springer
14 years 2 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
IEEEIAS
2007
IEEE
14 years 4 months ago
Computational Forensics: Towards Hybrid-Intelligent Crime Investigation
In recent years, mathematical, statistical and computer science methods have found extensive application in developing new procedures for crime investigation, prosecution and the ...
Katrin Franke, Sargur N. Srihari