Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it... more
    • by 
    •   22  
      Computer ScienceComputer ForensicsDigital InvestigationForensic Science
Bu çalışmada tam disk şifrelemesine (FDE: Full Disk Encryption) sahip olay yeri bilgisayarlarından delil elde etmede kullanılan teorik ve pratik yöntemler araştırılarak, şifreli disklerden adli delil elde etmede karşılaşılabilecek... more
    • by 
    •   22  
      Side-channel attackThe TempestNetwork Monitoring and MeasurementsEfS
The growing concern of various entities with the confidentiality of the data ultimately fostered the development of tools for data protection at various levels, from a simple password protection on a word processor to sophisticated... more
    • by 
    •   7  
      Computer ScienceInformation TechnologyForensicsEncryption
... Uma pessoa que esteja munitorando o canal de comunicação entre Alice e Bob conseguiria obter as chaves públicas geradas, contudo não conseguiria gerar a chave se-creta K, visto que para gerá ... Nele coexistem diversas empresas,... more
    • by 
    •   6  
      Computer SecurityJava ProgrammingCriptografiaCriptography
Transporting information often requires environments which guarantee its security against unauthorized access. Several systems and cryptographic techniques require computing resources (memory and processing capabilities) that prevent... more
    • by  and +1
    •   6  
      Computer SecurityJava ProgrammingCriptografiaCriptography