Loading…

Design of traceable security system

Computer crimes are widely recognized as a significant computer threat. The submission of evidence in any type of legal proceeding is typically challenging, but when computers are involved, the problems are intensified. Special knowledge is required to locate and collect evidence and special care mu...

Full description

Saved in:
Bibliographic Details
Published in:Applied mathematics and computation 2005-09, Vol.168 (2), p.933-944
Main Authors: Ker-Chang Chang, Henry, Lu, Erl-Huei, Su, Pin-Chang
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Computer crimes are widely recognized as a significant computer threat. The submission of evidence in any type of legal proceeding is typically challenging, but when computers are involved, the problems are intensified. Special knowledge is required to locate and collect evidence and special care must be taken to preserve and transport the evidence. Evidence of a computer crime differs from conventional types of evidence in that most computer-related evidence is intangible—in the form of electronic pulses or magnetic charges. This paper presents a new scheme that has an analogy in natural immunology. A new method of identifying attackers that involves cryptology is also presented. The proposed method can be applied to various fields in information security, including digital signatures, conference key distribution schemes and on-line broadcasting security.
ISSN:0096-3003
1873-5649
DOI:10.1016/j.amc.2004.09.022