Hash-Tree Anti-Tampering Schemes
Data(s) |
2002
|
---|---|
Resumo |
Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes. The main problems of constructing such a scheme are its computational feasibility and its candidate reduction process. We show how to solve both problems by the use of secondary hashing over a tree structure. Finally, we give brief comments on our ongoing work in this area. |
Formato |
application/pdf |
Identificador |
http://eprints.nottingham.ac.uk/296/1/final-icita2002-bxm_copy.pdf Moss, Ben and Ashman, Helen (2002) Hash-Tree Anti-Tampering Schemes. In: IEEE International Conference on Information Technology and Applications, November 2002, Bathurst, Australia. |
Idioma(s) |
en |
Relação |
http://eprints.nottingham.ac.uk/296/ |
Tipo |
Conference or Workshop Item PeerReviewed |