Real-time parallel hashing on the GPU, ACM Transactions on Graphics, vol.28, issue.5 154, 2009. ,
Digital Forensics with Open Source Tools, 2011. ,
DOI : 10.1016/B978-1-59749-586-8.00001-7
Security Aspects of Piecewise Hashing in Computer Forensics, 2011 Sixth International Conference on IT Security Incident Management and IT Forensics, pp.21-36, 2011. ,
DOI : 10.1109/IMF.2011.16
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
DOI : 10.1145/362686.362692
Performance issues about contexttriggered piecewise hashing, Proceedings of the Third International ICST Conference on Digital Forensics and Cyber Crime, pp.141-155, 2011. ,
DOI : 10.1007/978-3-642-35515-8_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.657.5169
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2, Proceedings of the Fourth International ICST Conference on Digital Forensics and Cyber Crime, 2012. ,
DOI : 10.1145/362686.362692
An Efficient Piecewise Hashing Method for Computer Forensics, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008), pp.635-638, 2008. ,
DOI : 10.1109/WKDD.2008.80
Identifying almost identical files using context triggered piecewise hashing, Digital Investigation, pp.91-97, 2006. ,
DOI : 10.1016/j.diin.2006.06.015
Handbook of Applied Cryptography, 1997. ,
DOI : 10.1201/9781439821916
Cramming more components onto integrated circuits, Electronics Magazine, pp.114-117, 1965. ,
DOI : 10.1109/jproc.1998.658762
FNV hash (www.isthe.com, p.2012 ,
Data Fingerprinting with Similarity Digests, Advances in Digital Forensics VI, pp.207-226, 2010. ,
DOI : 10.1007/978-3-642-15506-2_15
URL : https://hal.archives-ouvertes.fr/hal-01060620
An evaluation of forensic similarity hashes, Digital Investigation, pp.34-41, 2011. ,
DOI : 10.1016/j.diin.2011.05.005
Fundamentals of Relational Database Management Systems, 2010. ,
DOI : 10.1007/978-3-540-48399-1
Multithreaded file I/O, Dr. Dobb's Journal, 2009. ,