{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:29Z","timestamp":1725751649168},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_7","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T14:47:31Z","timestamp":1381330051000},"page":"101-117","source":"Crossref","is-referenced-by-count":2,"title":["Reducing the Time Required for Hashing Operations"],"prefix":"10.1007","author":[{"given":"Frank","family":"Breitinger","sequence":"first","affiliation":[]},{"given":"Kaloyan","family":"Petrov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"7_CR1","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1145\/1618452.1618500","volume":"28","author":"D. Alcantara","year":"2009","unstructured":"D. Alcantara, A. Sharf, F. Abbasinejad, S. Sengupta, M. Mitzenmacher, J. Owens and N. Amenta, Real-time parallel hashing on the GPU, ACM Transactions on Graphics, vol. 28(5), article no. 154, 2009.","journal-title":"ACM Transactions on Graphics"},{"key":"7_CR2","volume-title":"Digital Forensics with Open Source Tools","author":"C. Altheide","year":"2011","unstructured":"C. Altheide and H. Carvey, Digital Forensics with Open Source Tools, Syngress, Waltham, Massachusetts, 2011."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/IMF.2011.16","volume-title":"Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics","author":"H. Baier","year":"2011","unstructured":"H. Baier and F. Breitinger, Security aspects of piecewise hashing in computer forensics, Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, pp. 21\u201336, 2011."},{"key":"7_CR4","unstructured":"A. Baxter, SSD vs. HDD (\n \n www.storagereview.com\/ssd_vs_hdd\n \n \n ), 2012."},{"issue":"7","key":"7_CR5","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"B. Bloom, Space\/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol. 13(7), pp. 422\u2013426, 1970.","journal-title":"Communications of the ACM"},{"key":"7_CR6","first-page":"141","volume-title":"Proceedings of the Third International ICST Conference on Digital Forensics and Cyber Crime","author":"F. Breitinger","year":"2011","unstructured":"F. Breitinger and H. Baier, Performance issues about context-triggered piecewise hashing, Proceedings of the Third International ICST Conference on Digital Forensics and Cyber Crime, pp. 141\u2013155, 2011."},{"key":"7_CR7","volume-title":"Proceedings of the Fourth International ICST Conference on Digital Forensics and Cyber Crime","author":"F. Breitinger","year":"2012","unstructured":"F. Breitinger and H. Baier, Similarity preserving hashing: Eligible properties and a new algorithm mrsh-v2, Proceedings of the Fourth International ICST Conference on Digital Forensics and Cyber Crime, 2012."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/WKDD.2008.80","volume-title":"Proceedings of the First International Workshop on Knowledge Discovery and Data Mining","author":"L. Chen","year":"2008","unstructured":"L. Chen and G. Wang, An efficient piecewise hashing method for computer forensics, Proceedings of the First International Workshop on Knowledge Discovery and Data Mining, pp. 635\u2013638, 2008."},{"issue":"S","key":"7_CR9","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.diin.2006.06.015","volume":"3","author":"J. Kornblum","year":"2006","unstructured":"J. Kornblum, Identifying almost identical files using context triggered piecewise hashing, Digital Investigation, vol. 3(S), pp. S91\u2013S97, 2006.","journal-title":"Digital Investigation"},{"key":"7_CR10","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, Florida, 1997."},{"key":"7_CR11","unstructured":"G. Moore, Cramming more components onto integrated circuits, Electronics Magazine, pp. 114\u2013117, April 19, 1965."},{"key":"7_CR12","unstructured":"National Institute of Standards and Technology, Secure Hash Standard, FIPS Publication 180-3, Gaithersburg, Maryland, 2008."},{"key":"7_CR13","unstructured":"National Institute of Standards and Technology, National Software Reference Library, Gaithersburg, Maryland (\n \n www.nsrl.nist.gov\n \n \n ), 2012."},{"key":"7_CR14","unstructured":"L. Noll, FNV hash (\n \n www.isthe.com\/chongo\/tech\/comp\/fnv\/index.html\n \n \n ), 2012."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"R. Rivest, MD5 Message-Digest Algorithm, RFC 1321, 1992.","DOI":"10.17487\/rfc1321"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-15506-2_15","volume-title":"Advances in Digital Forensics VI","author":"V. Roussev","year":"2010","unstructured":"V. Roussev, Data fingerprinting with similarity digests, in Advances in Digital Forensics VI, K. Chow and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 207\u2013226, 2010."},{"issue":"S","key":"7_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.diin.2011.05.005","volume":"8","author":"V. Roussev","year":"2011","unstructured":"V. Roussev, An evaluation of forensic similarity hashes, Digital Investigation, vol. 8(S), pp. S34\u2013S41, 2011.","journal-title":"Digital Investigation"},{"key":"7_CR18","volume-title":"Fundamentals of Relational Database Management Systems","author":"S. Sumathi","year":"2010","unstructured":"S. Sumathi and S. Esakkirajan, Fundamentals of Relational Database Management Systems, Springer-Verlag, Berlin Heidelberg, Germany, 2010."},{"key":"7_CR19","unstructured":"S. Woerthmueller, Multithreaded file I\/O, Dr. Dobb\u2019s Journal, September 28, 2009."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T06:56:53Z","timestamp":1558594613000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}