Loading…
Design of traceable security system
Computer crimes are widely recognized as a significant computer threat. The submission of evidence in any type of legal proceeding is typically challenging, but when computers are involved, the problems are intensified. Special knowledge is required to locate and collect evidence and special care mu...
Saved in:
Published in: | Applied mathematics and computation 2005-09, Vol.168 (2), p.933-944 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Computer crimes are widely recognized as a significant computer threat. The submission of evidence in any type of legal proceeding is typically challenging, but when computers are involved, the problems are intensified. Special knowledge is required to locate and collect evidence and special care must be taken to preserve and transport the evidence. Evidence of a computer crime differs from conventional types of evidence in that most computer-related evidence is intangible—in the form of electronic pulses or magnetic charges. This paper presents a new scheme that has an analogy in natural immunology. A new method of identifying attackers that involves cryptology is also presented. The proposed method can be applied to various fields in information security, including digital signatures, conference key distribution schemes and on-line broadcasting security. |
---|---|
ISSN: | 0096-3003 1873-5649 |
DOI: | 10.1016/j.amc.2004.09.022 |