Back to Results
First PageMeta Content
Artificial intelligence / Cryptography / Hash table / Information science / Hash function / Hash chain / Cryptographic hash functions / Search algorithms / Hashing / Information retrieval


Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science
Add to Reading List

Document Date: 2007-09-24 16:43:05


Open Document

File Size: 238,76 KB

Share Result on Facebook
UPDATE