Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools.
Simson L. GarfinkelPublished in: Int. J. Digit. Crime Forensics (2009)
Keyphrases
- law enforcement agencies
- security protocols
- security properties
- key management
- forensic analysis
- information technology
- pdf files
- information security
- encryption decryption
- encryption scheme
- random number generator
- end users
- smart card
- management tools
- intrusion detection
- user friendliness
- security issues
- public key cryptography
- access control
- data security
- elliptic curve cryptography
- high assurance
- metadata
- fuzzy vault
- secure communication
- security services
- national security
- public safety
- security systems
- security model
- homeland security
- document analysis
- public key
- security requirements
- statistical databases