Authentication Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm, Advances in Cryptology -Asiacrypt '00, pp.531-545, 2000. ,
Forensics Is So "Yesterday", IEEE Security & Privacy Magazine, vol.7, issue.2, pp.18-25, 2009. ,
DOI : 10.1109/MSP.2009.37
Digital Forensics Works, IEEE Security & Privacy Magazine, vol.7, issue.2, pp.26-29, 2009. ,
DOI : 10.1109/MSP.2009.35
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988. ,
DOI : 10.1137/0217017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8353
Legal admissibility of evidence held in digital form, Computer Law & Security Review, vol.15, issue.3, pp.185-187, 1999. ,
DOI : 10.1016/S0267-3649(99)80037-5
Digital Logs -Proof Matters, Digital Investigation, pp.94-101, 2004. ,
Risk sensitive digital evidence collection, Digital Investigation, pp.101-119, 2005. ,
DOI : 10.1016/j.diin.2005.02.001
Building theoretical underpinnings for digital forensics research, Digital Investigation, pp.61-68, 2004. ,
DOI : 10.1016/j.diin.2003.12.004
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.7070
Adversarial Security: Getting to the Root of the Problem, Proc. iNetSec '10 ,
DOI : 10.1007/978-3-642-19228-9_5
URL : https://hal.archives-ouvertes.fr/hal-01581338
The admissibility and authentication of computer evidence - a confusion of issues, Computer Law & Security Review, vol.6, issue.2, pp.13-16, 1990. ,
DOI : 10.1016/0267-3649(90)90102-H
Practice-Oriented Provable Security and the Social Construction of Cryptography, IEEE Security & Privacy, vol.14, issue.6, 2009. ,
DOI : 10.1109/MSP.2016.122
Preparing evidence for court, Digital Investigation, pp.279-283, 2004. ,
DOI : 10.1016/j.diin.2004.11.005
Digital provenance ??? interpretation, verification and corroboration, Digital Investigation, pp.45-49, 2005. ,
DOI : 10.1016/j.diin.2005.01.002