Hash-Tree Anti-Tampering Schemes

Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes. The main problems of constructing such a scheme are its computational fea...

Full description

Bibliographic Details
Main Authors: Moss, Ben, Ashman, Helen
Format: Conference or Workshop Item
Published: 2002
Online Access:https://eprints.nottingham.ac.uk/296/