Article ID Journal Published Year Pages File Type
9506794 Applied Mathematics and Computation 2005 12 Pages PDF
Abstract
Computer crimes are widely recognized as a significant computer threat. The submission of evidence in any type of legal proceeding is typically challenging, but when computers are involved, the problems are intensified. Special knowledge is required to locate and collect evidence and special care must be taken to preserve and transport the evidence. Evidence of a computer crime differs from conventional types of evidence in that most computer-related evidence is intangible-in the form of electronic pulses or magnetic charges. This paper presents a new scheme that has an analogy in natural immunology. A new method of identifying attackers that involves cryptology is also presented. The proposed method can be applied to various fields in information security, including digital signatures, conference key distribution schemes and on-line broadcasting security.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, , ,