Browsing by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 8 to 27 of 42 < previous   next >
TitleAuthor(s)Issue Date
 
Challenges to Personal Data Protection in Cloud Computing
Journal:Journal of Law & Economic Regulation
2013
A dual cube hashing scheme for solving LPP integrity problem
Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings
2011
Dynamic integrity verification for software self-defense
Proceeding/Conference:Proceedings of The 2005 International Conference on Security and Management, SAM'05
2005
An e-lottery scheme using Verifiable Random Function
Proceeding/Conference:Lecture Notes in Computer Science
2005
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
An efficient bloom filter based solution for multiparty private matching
Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06
2006
 
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004
 
Empirical evaluation of information leakage detection using net-flow analysis
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
An Empirical Study Profiling Internet Pirates
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
Evaluation of evidence in internet auction fraud investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
 
An Exploratory Study of Profiling Online Auction Offenders
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
Forensic analysis of a Siemens Programmable Logic Controller
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
 
Forensic analysis of pirated Chinese Shanzhai mobile phones
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
1987
 
Fragmented JPEG file recovery using pseudo headers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
2005
A hybrid approach for authenticating MPEG-2 streaming data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
 
A model for foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
 
PLC Forensics Based On Control Program Logic Change Detection
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
 
2006