Citation: | SUN Guo-zi, GENG Wei-ming, CHEN Dan-wei, LIN Qing-xiu. One Trusted Fix Method of Digital Data Forensics[J]. Journal of Beijing University of Technology, 2010, 36(5): 621-626. DOI: 10.3969/j.issn.0254-0037.2010.05.010 |
[1] |
麦永浩,孙国梓,许榕生,等.计算机取证与司法鉴定[M].北京:清华大学出版社,2009:1-9.
|
[2] |
林清秀.电子数据可信取证的形式化方法研究[D].南京:南京邮电大学计算机学院,2009.LIN Qing-xiu.Research on the formalism of trusted forensics on digital data[D].Nanjing:College of Computer,NanjingUniversity of Posts&Telecommunications,2009.(in Chinese)
|
[3] |
薛金蓉,张洪斌.可信时间戳的网络服务器取证技术研究[J].电子科技大学学报,2007,36(6):1404-1406.XUE Jin-rong,ZHANG Hong-bin.Technical research of reliable timestamp based network server forensics[J].Journal ofUniversity of Electronic Science and Technology of China,2007,36(6):1404-1406.(in Chinese)
|
[4] |
BRADLEY S,GEORGE M,ANDREW C.A correlation method for establishing provenance of timestamps in digital evidence[J].Digital Investigation,2006,3(1):98-107.
|
[5] |
王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593.WANG Shang-ping,WANG Yu-min,ZHANG Ya-ling.Aconfirmer signature scheme based on DSAand RSA[J].Journal ofSoftware,2003,14(3):588-593.(in Chinese)
|
[6] |
陈少真,李大兴.基于DSA的适合大群体的有效群签名[J].计算机研究与发展,2004,41(2):282-286.CHEN Shao-zhen,LI Da-xing.An efficient group signature scheme for large group on DSA[J].Journal of ComputerResearch and Development,2004,41(2):282-286.(in Chinese)
|
[7] |
BRUCE J,NIKKEL.A portable network forensic evidence collector[J].Digital Investigation,2006,3(3):127-135.
|
[8] |
ZOU C,CHIGAN C X.On game theoretic DSA-driven MAC for cognitive radio networks[J].Computer Communications,2009,32(18):1944-1954.
|
[9] |
綦朝晖,孙济洲,郭琳琳.一种基于计算机取证的信息一致性方案[J].计算机工程,2006,32(11):172-173,176.QI Zhao-hui,SUNJi-zhou,GUO Lin-lin.Message integrity scheme on computer forensics[J].Computer Engineering,2006,32(11):172-173,176.(in Chinese)
|
[10] |
DITTRICH D.Basic steps in forensic analysis of Unix systems[EB/OL].(2001-12-09)[2009-02-06]http:∥staff.washington.edu/dittrich/misc/forensics/.
|