The Research of Keeping Digital Evidence in Untrusted Local Area Network
碩士 === 國立中央大學 === 資訊管理研究所 === 90 === By the rate of the information secirty events and computer crimes happened increasing, the business and computer users must face up to the problem. Because the high volatility of digital evidence, the illegal user do not usually cover up the happened event but a...
Main Authors: | Wen-Chao Yang, 楊文超 |
---|---|
Other Authors: | Shi-Jen Lin |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09925492911201343173 |
Similar Items
-
Trusted Storage over Untrusted Networks
by: Oliveria, Paulo F., et al.
Published: (2011) -
Efficient tamper-evident data structures for untrusted servers
Published: (2011) -
Physical Layer Security in Cognitive Untrusted Relay Networks
by: Dechuan Chen, et al.
Published: (2018-01-01) -
Physical Layer Security in an Untrusted Energy Harvesting Relay Network
by: Hui Shi, et al.
Published: (2019-01-01) -
Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks
by: Dan Deng, et al.
Published: (2017-01-01)