{"id":"https://openalex.org/W1481576017","doi":"https://doi.org/10.1007/978-0-387-73742-3_10","title":"Factors Affecting One-Way Hashing of CD-R Media","display_name":"Factors Affecting One-Way Hashing of CD-R Media","publication_year":2007,"publication_date":"2007-11-13","ids":{"openalex":"https://openalex.org/W1481576017","doi":"https://doi.org/10.1007/978-0-387-73742-3_10","mag":"1481576017"},"language":"en","primary_location":{"id":"doi:10.1007/978-0-387-73742-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-73742-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-73742-3_10.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2014 The International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-73742-3_10.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054311507","display_name":"Christopher Marberry","orcid":null},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Christopher Marberry","raw_affiliation_strings":["National Center for Forensic Science, University of Central Florida, Orlando"],"affiliations":[{"raw_affiliation_string":"National Center for Forensic Science, University of Central Florida, Orlando","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066463519","display_name":"Philip Craiger","orcid":null},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Philip Craiger","raw_affiliation_strings":["Digital Evidence at the National Center for Forensic Science, University of Central Florida, Orlando","Engineering Technology, USA"],"affiliations":[{"raw_affiliation_string":"Digital Evidence at the National Center for Forensic Science, University of Central Florida, Orlando","institution_ids":["https://openalex.org/I106165777"]},{"raw_affiliation_string":"Engineering Technology, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054311507"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07571401,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"149","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.881395697593689},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5526710152626038},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.45318859815597534},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.4191640019416809},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.382174551486969},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3460042178630829},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.3089603781700134},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26310524344444275}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.881395697593689},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5526710152626038},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.45318859815597534},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.4191640019416809},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.382174551486969},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3460042178630829},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.3089603781700134},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26310524344444275}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-0-387-73742-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-73742-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-73742-3_10.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2014 The International Federation for Information Processing","raw_type":"book-chapter"},{"id":"pmh:oai:commons.erau.edu:publication-2101","is_oa":true,"landing_page_url":"https://commons.erau.edu/publication/1005","pdf_url":null,"source":{"id":"https://openalex.org/S4377196356","display_name":"Scholarly Commons (Embry\u2013Riddle Aeronautical University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I84475105","host_organization_name":"Embry\u2013Riddle Aeronautical University","host_organization_lineage":["https://openalex.org/I84475105"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Publications","raw_type":"text"},{"id":"pmh:oai:stars.library.ucf.edu:scopus2000-6938","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2000/5939","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2000s","raw_type":"text"},{"id":"pmh:oai:works.bepress.com:john_craiger-1003","is_oa":false,"landing_page_url":"https://works.bepress.com/john_craiger/3","pdf_url":null,"source":{"id":"https://openalex.org/S4377196356","display_name":"Scholarly Commons (Embry\u2013Riddle Aeronautical University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I84475105","host_organization_name":"Embry\u2013Riddle Aeronautical University","host_organization_lineage":["https://openalex.org/I84475105"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"J. Philip Craiger","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/978-0-387-73742-3_10","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-73742-3_10","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-73742-3_10.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP \u2014 The International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1481576017.pdf","grobid_xml":"https://content.openalex.org/works/W1481576017.grobid-xml"},"referenced_works_count":3,"referenced_works":["https://openalex.org/W1639305476","https://openalex.org/W2916086000","https://openalex.org/W3145042860"],"related_works":["https://openalex.org/W122749164","https://openalex.org/W4210289650","https://openalex.org/W1554022419","https://openalex.org/W3019245231","https://openalex.org/W179740592","https://openalex.org/W2982222368","https://openalex.org/W2113619720","https://openalex.org/W2976219018","https://openalex.org/W1555390378","https://openalex.org/W2110701844"],"abstract_inverted_index":{"While":[0],"conducting":[1],"a":[2,18,32],"validation":[3],"study":[4],"of":[5,34,40,65,78],"proficiency":[6],"test":[7],"media":[8],"we":[9],"found":[10],"that":[11,48],"applying":[12],"the":[13,38,41,62,76],"same":[14],"hash":[15,28,43,58],"algorithm":[16],"against":[17],"single":[19],"CD":[20],"using":[21],"different":[22,27,57],"forensic":[23,53],"applications":[24,54],"resulted":[25],"in":[26,68],"values.":[29,44,59],"We":[30,60],"formulated":[31],"series":[33],"experiments":[35],"to":[36,55],"determine":[37],"cause":[39,52],"anomalous":[42],"Our":[45],"results":[46],"suggest":[47],"certain":[49],"write":[50],"options":[51],"report":[56],"examine":[61],"possible":[63],"consequences":[64],"these":[66],"anomalies":[67],"legal":[69],"proceedings":[70],"and":[71],"provide":[72],"best":[73],"practices":[74],"for":[75],"use":[77],"hashing":[79],"procedures.":[80]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
