M. Bellare and C. Namprempre, Authentication Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm, Advances in Cryptology -Asiacrypt '00, pp.531-545, 2000.

M. A. Caloyannides, Forensics Is So "Yesterday", IEEE Security & Privacy Magazine, vol.7, issue.2, pp.18-25, 2009.
DOI : 10.1109/MSP.2009.37

B. D. Carrier, Digital Forensics Works, IEEE Security & Privacy Magazine, vol.7, issue.2, pp.26-29, 2009.
DOI : 10.1109/MSP.2009.35

S. Goldwasser, S. Micali, and R. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988.
DOI : 10.1137/0217017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. J. Kearsley, Legal admissibility of evidence held in digital form, Computer Law & Security Review, vol.15, issue.3, pp.185-187, 1999.
DOI : 10.1016/S0267-3649(99)80037-5

E. E. Kenneally, Digital Logs -Proof Matters, Digital Investigation, pp.94-101, 2004.

E. E. Kenneally and C. L. Brown, Risk sensitive digital evidence collection, Digital Investigation, pp.101-119, 2005.
DOI : 10.1016/j.diin.2005.02.001

S. Mocas, Building theoretical underpinnings for digital forensics research, Digital Investigation, pp.61-68, 2004.
DOI : 10.1016/j.diin.2003.12.004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. C. Phan, J. N. Whitley, and D. J. Parish, Adversarial Security: Getting to the Root of the Problem, Proc. iNetSec '10
DOI : 10.1007/978-3-642-19228-9_5

URL : https://hal.archives-ouvertes.fr/hal-01581338

C. Reed, The admissibility and authentication of computer evidence - a confusion of issues, Computer Law & Security Review, vol.6, issue.2, pp.13-16, 1990.
DOI : 10.1016/0267-3649(90)90102-H

P. Rogaway, Practice-Oriented Provable Security and the Social Construction of Cryptography, IEEE Security & Privacy, vol.14, issue.6, 2009.
DOI : 10.1109/MSP.2016.122

M. Solon and P. Harper, Preparing evidence for court, Digital Investigation, pp.279-283, 2004.
DOI : 10.1016/j.diin.2004.11.005

P. Turner, Digital provenance ??? interpretation, verification and corroboration, Digital Investigation, pp.45-49, 2005.
DOI : 10.1016/j.diin.2005.01.002