Cryptography Reference
In-Depth Information
[25]
Oppliger, R., and R. Rytz, “Digital Evidence: Dream and Reality,”
IEEE Security & Privacy
,Vol.
1, No. 5, September/October 2003, pp. 44-48.
[26]
Maurer, U.M., “Intrinsic Limitations of Digital Signatures and How to Cope with Them,”
Proceedings of the 6th Information Security Conference (ISC '03)
, Springer-Verlag, LNCS 2851,
pp. 180-192.
[27]
Maurer, U.M., “New Approaches to Digital Evidence,”
Proceedings of the IEEE
, Vol. 92, No. 6,
June 2004, pp. 933-947.