{"id":"https://openalex.org/W4407362469","doi":"https://doi.org/10.1109/ispacs62486.2024.10869225","title":"Secure Handwritten Protocol for Protecting Integrity of Digital Evidences","display_name":"Secure Handwritten Protocol for Protecting Integrity of Digital Evidences","publication_year":2024,"publication_date":"2024-12-10","ids":{"openalex":"https://openalex.org/W4407362469","doi":"https://doi.org/10.1109/ispacs62486.2024.10869225"},"language":"en","primary_location":{"id":"doi:10.1109/ispacs62486.2024.10869225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispacs62486.2024.10869225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074821024","display_name":"Chien-Lung Hsu","orcid":"https://orcid.org/0000-0003-3105-5939"},"institutions":[{"id":"https://openalex.org/I173093425","display_name":"Chang Gung University","ror":"https://ror.org/00d80zx46","country_code":"TW","type":"education","lineage":["https://openalex.org/I173093425"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chien-Lung Hsu","raw_affiliation_strings":["Graduate Institute of Management, Chang Gung University (R.O.C),Taoyuan,Taiwan"],"affiliations":[{"raw_affiliation_string":"Graduate Institute of Management, Chang Gung University (R.O.C),Taoyuan,Taiwan","institution_ids":["https://openalex.org/I173093425"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090812460","display_name":"Wilson Lin","orcid":"https://orcid.org/0000-0003-1960-3410"},"institutions":[{"id":"https://openalex.org/I173093425","display_name":"Chang Gung University","ror":"https://ror.org/00d80zx46","country_code":"TW","type":"education","lineage":["https://openalex.org/I173093425"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wei-Qian Lin","raw_affiliation_strings":["Chang Gung University (R.O.C),Department of Information Management,Taoyuan,Taiwan"],"affiliations":[{"raw_affiliation_string":"Chang Gung University (R.O.C),Department of Information Management,Taoyuan,Taiwan","institution_ids":["https://openalex.org/I173093425"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077098538","display_name":"Sheng-Hsin Tso","orcid":null},"institutions":[{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Sheng-Hsin Tso","raw_affiliation_strings":["National Central University (R.O.C),Department of Information Management,Taoyuan,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Central University (R.O.C),Department of Information Management,Taoyuan,Taiwan","institution_ids":["https://openalex.org/I22265921"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074821024"],"corresponding_institution_ids":["https://openalex.org/I173093425"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43585243,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9520999789237976,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9197999835014343,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7263646125793457},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6486537456512451},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5550235509872437},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4798707067966461},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.47479572892189026},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.46708202362060547},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3458840250968933},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.07890099287033081}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7263646125793457},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6486537456512451},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5550235509872437},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4798707067966461},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.47479572892189026},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.46708202362060547},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3458840250968933},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.07890099287033081},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ispacs62486.2024.10869225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispacs62486.2024.10869225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320313619","display_name":"Chang Gung Memorial Hospital","ror":"https://ror.org/02verss31"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1030356928","https://openalex.org/W2033536268"],"related_works":["https://openalex.org/W2159180878","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W1982325601","https://openalex.org/W2282990539","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2342603380","https://openalex.org/W2626486901"],"abstract_inverted_index":{"With":[0],"the":[1,10,36,47,99,105,109,115,123,134],"advancement":[2],"of":[3,101,117,136],"technology,":[4,55],"people":[5],"constantly":[6],"use":[7,135],"IT":[8],"through":[9],"Internet.":[11],"In":[12],"this":[13,20],"modern":[14],"living":[15],"environment,":[16],"many":[17],"individuals":[18],"exploit":[19],"technological":[21],"landscape":[22],"for":[23],"illegal":[24],"gains":[25],"and":[26,39,88,139],"criminal":[27,51],"activities.":[28],"Judicial":[29],"investigation":[30],"units":[31],"gather":[32],"relevant":[33],"evidence":[34,74,106,138,145],"from":[35],"crime":[37,44],"scene":[38],"process":[40],"it":[41,56,132],"when":[42],"a":[43,102],"occurs.":[45],"When":[46],"medium":[48],"used":[49],"in":[50,129],"activity":[52],"involves":[53],"information":[54],"is":[57],"referred":[58],"to":[59,84,143],"as":[60,120],"digital":[61,73,94,118,137],"evidence.":[62],"Unlike":[63],"traditional":[64],"evidence,":[65,119],"which":[66],"leaves":[67],"traces":[68],"if":[69],"moved":[70],"or":[71],"altered,":[72],"can":[75,96,126],"be":[76,127],"copied":[77],"without":[78],"any":[79],"detectable":[80],"changes,":[81],"posing":[82],"challenges":[83],"maintaining":[85],"its":[86],"integrity":[87],"accuracy.":[89],"This":[90],"article":[91],"explores":[92],"how":[93,114],"identification":[95],"ensure":[97],"that":[98],"content":[100],"report":[103],"matches":[104],"seized":[107],"at":[108],"scene.":[110],"It":[111],"also":[112],"addresses":[113],"validity":[116],"presented":[121],"by":[122],"investigating":[124],"authority,":[125],"upheld":[128],"court.":[130],"Additionally,":[131],"discusses":[133],"electronic":[140],"handwritten":[141],"signatures":[142],"enhance":[144],"preservation":[146],"measures.":[147]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
