Login / Signup
Certificates for Verifiable Forensics.
Radha Jagadeesan
C. M. Lubinski
Corin Pitcher
James Riely
Charles Winebrinner
Published in:
CSF (2014)
Keyphrases
</>
access control
sufficient conditions
public key
digital forensics
secret sharing
document analysis
public key infrastructure
law enforcement
real time
data sets
social networks
feature selection
bayesian networks
forgery detection