Dissertation > Excellent graduate degree dissertation topics show

Agent-Based Electronic Signatures to the Technical Evidence Model and Applied Research

Author: LuoLiLin
Tutor: XiangHong;FengZhiQiang
School: Chongqing University
Course: Software Engineering
Keywords: Electronic forensics Proxy Signature
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 93
Quote: 0
Read: Download Dissertation

Abstract


In recent years , computer cyber crime cases rose sharply , computer network crime has become a widespread international problem . Crack down on crimes against computer networks , the key is to find adequate, reliable , legally binding electronic evidence . Therefore , the electronic forensics has been more and more attention and become a hot research field of computer network security . The in-depth study and discussion of network electronic forensics technology , attempting to solve the existing problems in the network of electronic evidence collection from a technical point of view , so as to provide strong technical support and assistance for the implementation of cyber law . In this paper, complete the following tasks : study reviewed the electronic forensics technology , introduction the forensics course of the development of the electronic as well as domestic and foreign research status , from forensics model and forensics technical analysis of the current electronic forensics technology inadequate. Starting from these two issues , this paper presents the Agent signature network electronic forensics process model , the model provides a clearer network the electronic forensics process framework and the given network electronic evidence collection process should follow the basic principles and basic steps , effectively guaranteed the electronic evidence authenticity , integrity , and reliability , as well as anti -repudiation . Designed and implemented under the guidance of the forensic process model , electronic signature network forensics Agent system , this paper describes in detail the four components of the forensic system , introduced forensic server , proxy system forensics , evidence analysis and playback system design ideas , works and module design and implementation. Zero-copy technology - based network data acquisition, a true random number generator software implementation , network packet protocol analysis technology applied in the implementation process . Meanwhile, the paper also illustrates the deployment and application of the forensic system . Finally , the paper made ??a summary and outlook for network electronic forensics technology .

Related Dissertations

  1. The Research on the Divisibility of E-Cash,F713.36
  2. The Research and Design of Leakage-Resilient Identity-based Signature Scheme,TN918.1
  3. Research on the Security in Wireless Sensor Network,TN915.08
  4. Data Collection and Communication for Online Signature Based on USB Interface Technology,TP274.2
  5. Design and Application of the Threshold Signature Scheme,TN918.1
  6. The Improved RSA Algorithm and Application in Digital Signatures,TN918.1
  7. Several Digital Signature Scheme Algorithm Design,TN918.1
  8. An Improvement and Exploration for Digital Signature Technology Based on Convex Hull Theory and Information Hiding,TN918.2
  9. The Analysis and Design on Signcryption,TN918.1
  10. ECC Based on Fast Digital Signature and Its Implememtation,TN918.1
  11. Secret Sharing and Application of Secret Sharing in Proxy Signature,TN918.1
  12. Research on Mobile Devices Wireless Access to the Internet Based on Bluetooth Technology,TN925
  13. Research and Application of Ring Signature in Ad Hoc Networks,TN918.82
  14. The Design and Implementation of trusted digital signature system,TN918.1
  15. Forward-Secure Signature Research Based on Public Key Cryptosystem,TN918.1
  16. The Research and Implementation of the Electronic Seal Technology Based on Digital Signature,TN918.2
  17. Batch Verification of Short Group Signatures and Research on Hierarchical Group Signature Scheme,TN918.1
  18. Design and Implementation of Paperless Business System for Telecom Enterprise,TP311.52
  19. Sign up for automatic identification systems based on neural network offline,TP391.41
  20. Design and Implementation of Electornoic Forensics Sytem in Prosecution,TP399-C2
  21. Research and Implementation of Network-based P2P Worm Detection System,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile