Login / Signup
Secure logging scheme for forensic analysis in cloud.
Thankaraja Raja Sree
Somasundaram Mary Saira Bhanu
Published in:
Concurr. Comput. Pract. Exp. (2019)
Keyphrases
</>
forensic analysis
authentication scheme
cloud computing
flow analysis
public key encryption
security analysis
key distribution
digital forensics
data mining
authentication protocol
information systems
cellular automata
forensic science