期刊文献+

基于无线网络犯罪的数字取证研究

Research of digital forensics based on wireless network crime
下载PDF
导出
摘要 无线网络非法入侵是一种新的犯罪形式,执法人员需要通过详细的追踪和调查,发现有力的数字证据,因此,在数字取证中,建立一个合法有效的取证机制是非常重要的.结合工作实际,在研究相关文献的基础上,提出了一个无线网络犯罪的标准化取证机制.这种取证机制将大大提高执法人员在打击无线网络犯罪方面的效率. Wireless network break - ins is a new form of crime, the law - enforcement officials need to find some strong digital evidence by detailed tracking and investigation, and therefore, the establishment of a legally effective evidence gathering mechanism is crucial in digital forensics. Based on previous research findings, this research proposes an evidence gathering mechanism , which would greatly improve the efficiency of law enforcement in combating crimes in wireless network connection.
出处 《云南民族大学学报(自然科学版)》 CAS 2013年第1期71-74,共4页 Journal of Yunnan Minzu University:Natural Sciences Edition
基金 国家社会科学基金(09XTQ004)
关键词 无线网络犯罪 计算机犯罪 数字取证 wireless network crime computer crime digital forensics
  • 相关文献

参考文献9

  • 1EOGHAN C. Digital evidence and computer crime[M].Academic Press,Inc,2004.
  • 2LIN I L. Cybercrime:Theory and practice[D].Taibei:Central Police University,2009.
  • 3BECKETF J,SLAY J. Digital forensics:Validation and verification in a dynamic work environment[A].2007.79-83.
  • 4EOGHAN C. Handbook of digital forensics and investigation[M].Elsevier Academic Press,2009.
  • 5LIN I L,YANG H C,WANG C H. Researches on related techniques of information security forensics,laws and society[A].2002.166-170.
  • 6LIN I L,LAN T S. Discussion on digital evidence collection procedures[A].Taibei:Central Police University,2003.113-118.
  • 7赵蕴龙,要彬彦,董钊,姚爱红,高振国.多跳无线网络通用网络编码结构研究[J].计算机应用,2011,31(A02):1-4. 被引量:3
  • 8胡吉旦,卢建朱.无线网络中一种基于智能卡的匿名认证方案[J].计算机工程,2012,38(1):122-124. 被引量:1
  • 9韩莉,钱焕延.无线网络可靠多播反馈算法的优化[J].计算机工程与应用,2012,48(6):80-83. 被引量:2

二级参考文献12

  • 1Adamson B,Bormann C,Handley M,et al.RFC 5740 NACK- oriented reliable multicast transport protocol[S].2009.
  • 2Rizzo L.Effective erasure codes for reliable computer communication protocols[J].ACM SIGCOMM Computer Communication Review, 1997,27 (2) : 24-36.
  • 3Sisalem D,Wolisz A.MLDA:a TCP_friendly congestion control framework for heterogeneous multicast environments[C]//Proc of the 8th International Workshop on Quality of Service, Pittsburgh, 2000: 65 -74.
  • 4Tzeng Z J, Tzeng W (3. Authentication of Mobile Users in Third Generation Mobile System[J]. Wireless Personal Communications, 2001, 16(1): 35-50.
  • 5Lee C C, Yang Chaochen, Hwang M S. A New Privacy and Authentication Protocol for End-to-end Mobile Users[J]. International Journal of Commmunication Systems, 2003, 16(9): 799-808.
  • 6Chang C C, Chen Kuolun, Hwang M S. End-to-end Security Protocol for Mobile Communications with End-user Identification/ Authentication[J]. Wireless Persona/Communications, 2004, 28(2) 95-106.
  • 7Zhu Jianming, Ma Jianfeng. A New Authentication Scheme with Anonymity for Wireless Environments[J]. IEEE Transactions on Consumer Electronics, 2004, 50(1): 231-235.
  • 8Lee C C, Hwang M S. Security Enhancement on a New Authentication Scheme with Anonymity for Wireless Environments[J]. IEEE Transactions on Industrial Electronics, 2006.53(5): 1683-1687.
  • 9Xu Jing, Zhu Wentao, Feng Dengguo. An Efficient Mutual Authentication and Key Agreement Protocol Preserving User Anonymity in Mobile Networks[J]. Computer Communications, 2011, 34(3): 319-325.
  • 10杨林,郑刚,胡晓惠.网络编码的研究进展[J].计算机研究与发展,2008,45(3):400-407. 被引量:47

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部