Article ID Journal Published Year Pages File Type
458194 Digital Investigation 2007 7 Pages PDF
Abstract

Data assurance have come under scrutiny due to attacks on hashing schemes. This article explores a methodology for increasing the attack difficulty as well as reducing the size of the suspect area in those cases in which assurance is not based on a totality of a file (such as a document in which only a single paragraph may be suspect).

Keywords
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,