2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering 2008
DOI: 10.1109/sadfe.2008.19
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Digital Legal Professional Privilege (LPP) Data

Abstract: To enable free communication between legal advisor and his client for proper functioning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…[11] tried to apply 3-D scheme to solve the LPP integrity problem. However, they assume that somehow the list of the sectors (files) to be claimed as LPP data may be known in order to create an additional hash chain on those affected sectors.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…[11] tried to apply 3-D scheme to solve the LPP integrity problem. However, they assume that somehow the list of the sectors (files) to be claimed as LPP data may be known in order to create an additional hash chain on those affected sectors.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The section first reviews the modified 3-D hashing scheme given in [11], then proposes the "Dual Cube" hashing scheme which can greatly enhance the performance of the integrity verification scheme by reducing the number of possibly affected sectors.…”
Section: Dual Cube Hashing Schemementioning
confidence: 99%
See 2 more Smart Citations
“…In other cases when the suspect is allowed to modify or delete some of the sectors on his own (e.g. files classified as Legal Professional Privilege data [3]), we may try to see if the integrity of the evidence is not affected. So, the approach of storing one single chained hash value is less attractive.…”
Section: Introductionmentioning
confidence: 99%