作者: Bruce Schneier , John Kelsey
DOI:
关键词:
摘要: Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof log where amount of information exchange required verify entries is greatly reduced. By making audit-log verification more efficient, this system suitable implementation low-bandwidth environments.