Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
458194 | Digital Investigation | 2007 | 7 Pages |
Abstract
Data assurance have come under scrutiny due to attacks on hashing schemes. This article explores a methodology for increasing the attack difficulty as well as reducing the size of the suspect area in those cases in which assurance is not based on a totality of a file (such as a document in which only a single paragraph may be suspect).
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Christopher Malinowski, Richard Noble,