Security Aspects of Fuzzy Hashing, 2011. ,
mvHash-B - A New Approach for Similarity Preserving Hashing, 2013 Seventh International Conference on IT Security Incident Management and IT Forensics, pp.33-44, 2013. ,
DOI : 10.1109/IMF.2013.18
Performance issues about contexttriggered piecewise hashing, Proceedings of the Third International ICST Conference on Digital Forensics and Cyber Crime, pp.141-155, 2011. ,
DOI : 10.1007/978-3-642-35515-8_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.657.5169
Security aspects of piecewise hashing in computer forensics, Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, pp.21-36, 2011. ,
A fuzzy hashing approach based on random sequences and Hamming distance, Proceedings of the Conference on Digital Forensics, Security and Law, 2012. ,
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2, Proceedings of the Fourth International ICST Conference on Digital Forensics and Cyber Crime, 2012. ,
DOI : 10.1145/362686.362692
FRASH: A framework to test algorithms of similarity hashing, Digital Investigation, pp.50-58, 2013. ,
DOI : 10.1016/j.diin.2013.06.006
An Efficient Piecewise Hashing Method for Computer Forensics, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008), pp.635-638, 2008. ,
DOI : 10.1109/WKDD.2008.80
Distribution de la flore alpine dans le bassin des drouces et dans quelques regions voisines, Bulletin de la Société Vaudoise des Sciences Naturelles, pp.241-272, 1901. ,
Identifying almost identical files using context triggered piecewise hashing, Digital Investigation, pp.91-97, 2006. ,
DOI : 10.1016/j.diin.2006.06.015
Binary codes capable of correcting deletions, insertions and reversals, Soviet Physics Doklady, vol.10, issue.8, pp.707-710, 1966. ,
Fingerprinting by Random Polynomials, 1981. ,
The MD5 Message-Digest Algorithm, RFC 1321, 1992. ,
Building a better similarity trap with statistically improbable features, Proceedings of the Forty-Second Hawaii International Conference on System Sciences, 2009. ,
Data Fingerprinting with Similarity Digests, Advances in Digital Forensics VI, pp.207-226, 2010. ,
DOI : 10.1007/978-3-642-15506-2_15
URL : https://hal.archives-ouvertes.fr/hal-01060620
An evaluation of forensic similarity hashes, Digital Investigation, pp.34-41, 2011. ,
DOI : 10.1016/j.diin.2011.05.005
Managing terabyte-scale investigations with similarity digests, in Advances in Digital Forensics VIII, pp.19-34, 2012. ,
Detecting Similar Files Based on Hash and Statistical Analysis for Digital Forensic Investigation, 2009 2nd International Conference on Computer Science and its Applications, 2009. ,
DOI : 10.1109/CSA.2009.5404198
Approaches to Similarity-Preserving Hashing, 2012. ,