<--- Back to Details
First PageDocument Content
Artificial intelligence / Cryptography / Hash table / Information science / Hash function / Hash chain / Cryptographic hash functions / Search algorithms / Hashing / Information retrieval
Date: 2007-09-24 16:43:05
Artificial intelligence
Cryptography
Hash table
Information science
Hash function
Hash chain
Cryptographic hash functions
Search algorithms
Hashing
Information retrieval

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

Add to Reading List

Source URL: www.cs.arizona.edu

Download Document from Source Website

File Size: 238,76 KB

Share Document on Facebook

Similar Documents

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University   Adrian Perrig

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

DocID: 1phYN - View Document

SPV: Secure Path Vector Routing for Securing BGP  ∗ Yih-Chun Hu Adrian Perrig

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

DocID: 1oDfz - View Document

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

DocID: 1mkCs - View Document

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass  Department of Computer Science

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

DocID: 18LEA - View Document

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1  2

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

DocID: 180eG - View Document