{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:10Z","timestamp":1750221250309,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3232811","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Digitally Signed and Permission Restricted PDF Files"],"prefix":"10.1145","author":[{"given":"Patricio","family":"Domingues","sequence":"first","affiliation":[{"name":"ESTG - Polytechnic Institute of Leiria, Instituto de Telecomunica\u00e7\u00f5es, Centro de Investiga\u00e7\u00e3o em Inform\u00e1tica e Comunica\u00e7\u00f5es, Leiria, Portugal"}]},{"given":"Miguel","family":"Frade","sequence":"additional","affiliation":[{"name":"ESTG - Polytechnic Institute of Leiria, Centro de Investiga\u00e7\u00e3o em Inform\u00e1tica e Comunica\u00e7\u00f5es, Leiria, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2754951"},{"key":"e_1_3_2_1_2_1","unstructured":"AusCert. {n. d.}. Deprecation of SHA1 Certificates. Website (access on 2018-05-10). ({n. d.}). https:\/\/cs.auscert.org.au\/news\/deprecation-of-shal-certificates.  AusCert. {n. d.}. Deprecation of SHA1 Certificates. Website (access on 2018-05-10). ({n. d.}). https:\/\/cs.auscert.org.au\/news\/deprecation-of-shal-certificates."},{"volume-title":"Autopsy - 3rd party modules. Website (access on 2018-05-10). (2018). https:\/\/wiki.sleuthkit.org\/index.php?title=Autopsy_3rd_Party_Modules","key":"e_1_3_2_1_3_1","unstructured":"Autopsy. 2018. Autopsy - 3rd party modules. Website (access on 2018-05-10). (2018). https:\/\/wiki.sleuthkit.org\/index.php?title=Autopsy_3rd_Party_Modules . Autopsy. 2018. Autopsy - 3rd party modules. Website (access on 2018-05-10). (2018). https:\/\/wiki.sleuthkit.org\/index.php?title=Autopsy_3rd_Party_Modules."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_18"},{"key":"e_1_3_2_1_5_1","first-page":"6","article-title":"Digital signature law of the United Nations, European Union, United Kingdom and United States: Promotion of growth in E-commerce with enhanced security","volume":"11","author":"Blythe Stephen E","year":"2005","unstructured":"Stephen E Blythe . 2005 . Digital signature law of the United Nations, European Union, United Kingdom and United States: Promotion of growth in E-commerce with enhanced security . Richmond Journal of Law & Technology 11 , 2 (2005), 6 . Stephen E Blythe. 2005. Digital signature law of the United Nations, European Union, United Kingdom and United States: Promotion of growth in E-commerce with enhanced security. Richmond Journal of Law & Technology 11, 2 (2005), 6.","journal-title":"Richmond Journal of Law & Technology"},{"volume-title":"Windows registry forensics: Advanced digital forensic analysis of the windows registry","author":"Carvey Harlan","key":"e_1_3_2_1_6_1","unstructured":"Harlan Carvey . 2011. Windows registry forensics: Advanced digital forensic analysis of the windows registry . Elsevier . Harlan Carvey. 2011. Windows registry forensics: Advanced digital forensic analysis of the windows registry. Elsevier."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.04.062"},{"volume-title":"Global Security, Safety and Sustainability & e-Democracy","author":"Cerqueira Isabel","key":"e_1_3_2_1_8_1","unstructured":"Isabel Cerqueira , V\u00edtor J S\u00e1 , and S\u00e9rgio Tenreiro de Magalh\u00e3es . 2012. Study of the Perception on the Portuguese Citizen Card and Electronic Signature . In Global Security, Safety and Sustainability & e-Democracy . Springer , 164--170. Isabel Cerqueira, V\u00edtor J S\u00e1, and S\u00e9rgio Tenreiro de Magalh\u00e3es. 2012. Study of the Perception on the Portuguese Citizen Card and Electronic Signature. In Global Security, Safety and Sustainability & e-Democracy. Springer, 164--170."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"David Cooper. 2008. Internet X. 509 public key infrastructure certificate and certificate revocation list (CRT) profile. RFC 5280. RFC Editor. 1--151 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt  David Cooper. 2008. Internet X. 509 public key infrastructure certificate and certificate revocation list (CRT) profile. RFC 5280. RFC Editor. 1--151 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_10_1","unstructured":"CMKC Cuijpers and Jessica Schroers. 2014. eIDAS as guideline for the development of a pan European eID framework in FutureID. (2014).  CMKC Cuijpers and Jessica Schroers. 2014. eIDAS as guideline for the development of a pan European eID framework in FutureID. (2014)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.11.002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"e_1_3_2_1_14_1","unstructured":"Gemalto. 2017. 10 years of Portuguese ID card. Website (access on 2018-04-30). (2017). https:\/\/www.gemalto.com\/govt\/customer-cases\/portugal-id.  Gemalto. 2017. 10 years of Portuguese ID card. Website (access on 2018-04-30). (2017). https:\/\/www.gemalto.com\/govt\/customer-cases\/portugal-id."},{"key":"e_1_3_2_1_15_1","volume-title":"URL http:\/\/www.cgsecurity.org\/wiki\/PhotoRec","author":"Grenier Christophe","year":"2011","unstructured":"Christophe Grenier . 2011. Photorec. URL http:\/\/www.cgsecurity.org\/wiki\/PhotoRec ( 2011 ). Christophe Grenier. 2011. Photorec. URL http:\/\/www.cgsecurity.org\/wiki\/PhotoRec (2011)."},{"key":"e_1_3_2_1_16_1","volume-title":"Read, write and edit meta information. Software package","author":"Harvey Phil","year":"2013","unstructured":"Phil Harvey . 2013. ExifTool : Read, write and edit meta information. Software package available at http:\/\/www.sno.phy.queensu.ca\/phil\/exiftool ( 2013 ). Phil Harvey. 2013. ExifTool: Read, write and edit meta information. Software package available at http:\/\/www.sno.phy.queensu.ca\/phil\/exiftool (2013)."},{"key":"e_1_3_2_1_17_1","volume-title":"Document Management--Portable Document Format--Part 1: PDF 1.7","author":"ISO ISO.","year":"2008","unstructured":"ISO ISO. 2008. 32000-1 : 2008 , Document Management--Portable Document Format--Part 1: PDF 1.7 . International Organization for Standardization , Geneva, Switzerland ( 2008 ). ISO ISO. 2008. 32000-1: 2008, Document Management--Portable Document Format--Part 1: PDF 1.7. International Organization for Standardization, Geneva, Switzerland (2008)."},{"key":"e_1_3_2_1_18_1","volume-title":"Document Management--Portable Document Format--Part 2: PDF 2.0","author":"ISO ISO.","year":"2017","unstructured":"ISO ISO. 2017. 32000-2 : 2017 , Document Management--Portable Document Format--Part 2: PDF 2.0 . International Organization for Standardization , Geneva, Switzerland ( 2017 ). ISO ISO. 2017. 32000-2: 2017, Document Management--Portable Document Format--Part 2: PDF 2.0. International Organization for Standardization, Geneva, Switzerland (2017)."},{"key":"e_1_3_2_1_20_1","unstructured":"Duff Johnson Larry Masinter Dejan Markovic Matthew Hardy and Martin Bailey. 2017. RFC8118: The application\/pdf Media Type. RFC 8118. RFC Editor. 1--12 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc8118.txt  Duff Johnson Larry Masinter Dejan Markovic Matthew Hardy and Martin Bailey. 2017. RFC8118: The application\/pdf Media Type. RFC 8118. RFC Editor. 1--12 pages. https:\/\/www.rfc-editor.org\/rfc\/rfc8118.txt"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"volume-title":"Mobile Security and Privacy","author":"Liu Dyw","key":"e_1_3_2_1_22_1","unstructured":"Dyw Liu , Gz Xue , Y Xie , Xp Luo , and Mh Au. 2016. Performance of Digital Signature Schemes on Mobile Devices . In Mobile Security and Privacy . Elsevier . Dyw Liu, Gz Xue, Y Xie, Xp Luo, and Mh Au. 2016. Performance of Digital Signature Schemes on Mobile Devices. In Mobile Security and Privacy. Elsevier."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133969"},{"key":"e_1_3_2_1_24_1","volume-title":"Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2016 12th International Conference on. IEEE, 488--493","author":"Pan Weiwei","year":"2016","unstructured":"Weiwei Pan and Guolong Chen . 2016 . A method of off-line signature verification for digital forensics. In Natural Computation , Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2016 12th International Conference on. IEEE, 488--493 . Weiwei Pan and Guolong Chen. 2016. A method of off-line signature verification for digital forensics. In Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2016 12th International Conference on. IEEE, 488--493."},{"volume-title":"Version 1.0. (April","year":"2018","key":"e_1_3_2_1_25_1","unstructured":"PatricioDomingues. 2018. PatricioDomingues\/digiSignedOrProtectedPDF : Version 1.0. (April 2018 ). PatricioDomingues. 2018. PatricioDomingues\/digiSignedOrProtectedPDF: Version 1.0. (April 2018)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.09.002"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_28_1","unstructured":"Ben Rogers. 2009. Digital Signatures in a PDF. Website (access on 2018-04-30). (2009). https:\/\/www.adobe.com\/devnet-docs\/acrobatetk\/tools\/DigSig\/Acrobat_DigitalSignatures_in_PDF.pdf.  Ben Rogers. 2009. Digital Signatures in a PDF. Website (access on 2018-04-30). (2009). https:\/\/www.adobe.com\/devnet-docs\/acrobatetk\/tools\/DigSig\/Acrobat_DigitalSignatures_in_PDF.pdf."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.02.001"},{"key":"e_1_3_2_1_30_1","first-page":"45","article-title":"A Survey on digital signatures and its applications","volume":"3","author":"Roy Abhishek","year":"2012","unstructured":"Abhishek Roy and Sunil Karforma . 2012 . A Survey on digital signatures and its applications . Journal of Computer and Information Technology 3 , 1 (2012), 45 -- 69 . Abhishek Roy and Sunil Karforma. 2012. A Survey on digital signatures and its applications. Journal of Computer and Information Technology 3, 1 (2012), 45--69.","journal-title":"Journal of Computer and Information Technology"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"S Santesson M Myers R Ankney A Malpani S Galperin and C Adams. 2013. X. 509 internet public key infrastructure online certificate status protocol - OCSP (rfc 6960). RFC 6960. RFC Editor. 1--41 pages.  S Santesson M Myers R Ankney A Malpani S Galperin and C Adams. 2013. X. 509 internet public key infrastructure online certificate status protocol - OCSP (rfc 6960). RFC 6960. RFC Editor. 1--41 pages.","DOI":"10.17487\/rfc6960"},{"volume-title":"Applied cryptography: protocols, algorithms, and source code in C","author":"Schneier Bruce","key":"e_1_3_2_1_32_1","unstructured":"Bruce Schneier . 2007. Applied cryptography: protocols, algorithms, and source code in C . John Wiley & Sons . Bruce Schneier. 2007. Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.04.003"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_19"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2012.048084"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 25th USENIX Security Symposium. USENIX Organization, 893--910","author":"\u0160venda Petr","year":"2016","unstructured":"Petr \u0160venda , Mat\u00fa\u0161 Nemec , Peter Sekan , Rudolf Kva\u0161\u0148ovsky , David Form\u00e1nek , David Kom\u00e1rek , and Vashek Maty\u00e1\u0161 . 2016 . The Million-Key Question--Investigating the Origins of RSA Public Keys . In Proceedings of the 25th USENIX Security Symposium. USENIX Organization, 893--910 . Petr \u0160venda, Mat\u00fa\u0161 Nemec, Peter Sekan, Rudolf Kva\u0161\u0148ovsky, David Form\u00e1nek, David Kom\u00e1rek, and Vashek Maty\u00e1\u0161. 2016. The Million-Key Question--Investigating the Origins of RSA Public Keys. In Proceedings of the 25th USENIX Security Symposium. USENIX Organization, 893--910."},{"key":"e_1_3_2_1_37_1","volume-title":"E-services usage evaluation","author":"Taherdoost Hamed","year":"2013","unstructured":"Hamed Taherdoost , Shamsul Sahibuddin , and Neda Jalaliyoon . 2013. E-services usage evaluation ; applications' level of co-creation and digitalization. ( 2013 ). Hamed Taherdoost, Shamsul Sahibuddin, and Neda Jalaliyoon. 2013. E-services usage evaluation; applications' level of co-creation and digitalization. (2013)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Peter Yee. 2013. Updates to the internet X. 509 public key infrastructure certificate and Certificate Revocation List (CRL) profile. (2013).  Peter Yee. 2013. Updates to the internet X. 509 public key infrastructure certificate and Certificate Revocation List (CRL) profile. (2013).","DOI":"10.17487\/rfc6818"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3232811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3232811"}},"subtitle":["a Case Study on Digital Forensics"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":37,"alternative-id":["10.1145\/3230833.3232811","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3232811","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}