期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography 被引量:1
1
作者 Richard E Overill Jantje A M Silomon +1 位作者 Kam-Pui Chow Hayson Tse 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期9-15,共7页
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy... The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time. 展开更多
关键词 Trojan Horse defence child pornography digital forensic evidence complexity quantitative plausibility metrics posterior odds
在线阅读 下载PDF
A Two-Step Authentication Framework in Mobile Ad-Hoc Networks
2
作者 Nikos Komninos Dimitris Vergados Christos Douligeris 《China Communications》 SCIE CSCD 2007年第1期28-39,共12页
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication.Nevertheless,establishing trust in such a distributed environment is very difficult, since it is no... The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication.Nevertheless,establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted.An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message.In this paper,we propose an authentication approach for protecting nodes in mobile ad hoc networks.The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed.Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation. 展开更多
关键词 AUTHENTICATION STEPS LINK and network LAYERS ad HOC networks
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部