Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Rafael AccorsiPublished in: COMPSAC (2) (2009)
Keyphrases
- log data
- cryptographic protocols
- security protocols
- authentication protocol
- key distribution
- log records
- key exchange
- key agreement protocol
- multi party
- search result
- web log data
- key establishment
- log files
- data mining techniques
- security analysis
- log analysis
- query suggestion
- key management
- smart card
- data mining
- encryption scheme
- search logs
- search engine