Back to Results
First PageMeta Content
Computer hardware / Computer storage media / Computing / Hashing / Cryptography / Hash table / Hash function / SHA-2 / SHA-1 / Search algorithms / Cryptographic hash functions / Information science


doi:j.diin
Add to Reading List

Document Date: 2015-03-03 22:33:04


Open Document

File Size: 1,75 MB

Share Result on Facebook

Company

Fujitsu / Fujitsu Technology Solutions GmbH / Intel / Microsoft / Elsevier Ltd. / /

Country

United Kingdom / /

Currency

pence / USD / /

/

Facility

The National Institute of Standards and Technology / Richard Macfarlane Edinburgh Napier University / /

IndustryTerm

physical media / mathematical tools / internet history / triage solutions / forensic tools / sound boot media / disk imaging / le based systems / forensic triage tool / low speciļ¬cation legacy equipment / e-crime / digital devices / hash algorithm / Web Resource / legacy computing equipment / media triage / left digital forensic services / numerical applications / digital storage devices / i3 processor / digital forensic software / device using legacy equipment / forensic processing / digital forensic tools / forensic tool / pre-imaging / /

MusicAlbum

I/O / /

MusicGroup

RAM / SSD / /

OperatingSystem

Microsoft Windows / /

Organization

Naval Postgraduate School / National Institute of Standards and Technology / Napier University / International Disk Drive Equipment and Materials Association / Scottish Police / /

Person

Richard Macfarlane Edinburgh / Philip Penrose / /

Position

investigator / advocate that target acquisition / untrained operative / partition manager / Corresponding author / bulk_extractor / bulk_ extractor / /

Product

Bloom / /

ProgrammingLanguage

SQL / /

ProvinceOrState

Manitoba / /

Technology

i3 processor / RAM / hash algorithm / jpeg / disk drive / random access / operating system / operating systems / pdf / Intel Atom processor / semiconductors / http / /

URL

http /

SocialTag