Citation: | CHEN Long, FANG Xinlei, WANG Guoyin. Integrity Check Method for Fine-Grained Data Based on Complex Rotary Codes[J]. Journal of Southwest Jiaotong University, 2009, 22(5): 667-671. |
RICHARD III G G,ROUSSEV V.Next-generation digital forensics[J].Communications of the ACM,2006,49(2):76-80.[2] 王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644.WANG Ling,QIAN Hualin.Computer forensics and its future trend[J].Journal of Software,2003,14(9):1635-1644.[3] STEEL C.Windows forensics:the field guide for corporate computer investigations[M].Indianapolis:Wiley,2006.[4] ROUSSEV V,CHEN Yixin,BOURG T,et al.Md5bloom:forensic filesystem hashing revisited[J].Digital Investigation,2006,3(s1):82-90.[5] 陈龙,王国胤.一种细粒度数据完整性检验方法[J].软件学报,2009,20(4):902-909.CHEN Long,WANG Guoyin.An integrity check method for fine-grained data[J].Journal of Software,2009,20(4):902-909.[6] BOSE R.Information theory coding and cryptography[M].Beijing:China Machine Press,2003.[7] 靳蕃.复数旋转码特性的初步探讨[J].西南交通大学学报,1983(4):23-32.JIN Fan.An investigation of the characteristics of complex rotary code[J].Journal of Southwest Jiaotong University,1983(4):23-32.[8] 靳蕃,陈志.组合编码原理及应用[M].上海:上海科学技术出版社,1995.JIN Fan,CHEN Zhi.Combinatorial coding theory and its applications[M].Shanghai:Shanghai Scientific Technical Publishers,1995.
|