scispace - formally typeset
Open AccessJournal ArticleDOI

Privacy-preserving email forensics

Reads0
Chats0
TLDR
This work introduces a novel cryptographic scheme that allows to encrypt entire email boxes before handing them over for investigation and can non-interactively run keyword searches on the encrypted data and decrypt those emails (and only those) for which a configurable number of matches occurred.
About
This article is published in Digital Investigation.The article was published on 2015-08-01 and is currently open access. It has received 26 citations till now. The article focuses on the topics: Digital forensics & Encryption.

read more

Citations
More filters
Journal ArticleDOI

A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework

TL;DR: This study proposes a new network forensics framework, called a Particle Deep Framework (PDF), which describes the digital investigation phases for identifying and tracing attack behaviors in IoT networks, and results reveal a high performance of the proposed framework for discovering and tracing cyber-attack events compared with the other techniques.
Journal ArticleDOI

Availability of datasets for digital forensics And what is missing

TL;DR: There are many datasets for use out there but finding them can be challenging and the importance of sharing datasets to allow researchers to replicate results and improve the state of the art is stressed.
Proceedings ArticleDOI

Enhancing Network Forensics with Particle Swarm and Deep Learning: The Particle Deep Framework

TL;DR: The Particle Deep Framework is proposed, a new network forensic framework for IoT networks that utilised Particle Swarm Optimisation to tune the hyperparameters of a deep MLP model and improve its performance.
Journal ArticleDOI

Digital forensic tools: Recent advances and enhancing the status quo

TL;DR: Almost 800 articles from pertinent venues from 2014 to 2019 were analyzed to answer the following three questions: what tools have been released; are they still available, maintained, and documented; and are there possibilities to enhance the status quo.
BookDOI

Open Problems in Network Security

TL;DR: The objective of this workshop is to bring together researchers in the field of network security to discuss the open problems and future research directions.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
BookDOI

The Universal Declaration of Human Rights: Origins, Drafting, and Intent

TL;DR: The Universal Declaration of Human Rights (UDHR) as mentioned in this paper is the moral backbone of more than two hundred human rights instruments that are now a part of our world and has been a source of hope and inspiration to thousands of groups and millions of oppressed individuals.
Book

The Design of Rijndael: AES - The Advanced Encryption Standard

TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Related Papers (5)