File Download
 
 
Supplementary

Postgraduate Thesis: New cryptographic schemes with application in network security and computer forensics
  • Basic View
  • Metadata View
  • XML View
TitleNew cryptographic schemes with application in network security and computer forensics
 
AuthorsJiang, Lin
蒋琳
 
Issue Date2010
 
PublisherThe University of Hong Kong (Pokfulam, Hong Kong)
 
AdvisorsHui, CK
 
DegreeDoctor of Philosophy
 
SubjectData encryption (Computer science)
Computer networks - Security measures.
Computer crimes - Investigation.
Computer security.
Forensic sciences.
 
Dept/ProgramComputer Science
 
DOIhttp://dx.doi.org/10.5353/th_b4475322
 
DC FieldValue
dc.contributor.advisorHui, CK
 
dc.contributor.authorJiang, Lin
 
dc.contributor.author蒋琳
 
dc.date.hkucongregation2010
 
dc.date.issued2010
 
dc.description.naturepublished_or_final_version
 
dc.description.thesisdisciplineComputer Science
 
dc.description.thesisleveldoctoral
 
dc.description.thesisnameDoctor of Philosophy
 
dc.identifier.doihttp://dx.doi.org/10.5353/th_b4475322
 
dc.identifier.hkulb4475322
 
dc.languageeng
 
dc.publisherThe University of Hong Kong (Pokfulam, Hong Kong)
 
dc.relation.ispartofHKU Theses Online (HKUTO)
 
dc.rightsThe author retains all proprietary rights, (such as patent rights) and the right to use in future works.
 
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License
 
dc.source.urihttp://hub.hku.hk/bib/B44753226
 
dc.subject.lcshData encryption (Computer science)
 
dc.subject.lcshComputer networks - Security measures.
 
dc.subject.lcshComputer crimes - Investigation.
 
dc.subject.lcshComputer security.
 
dc.subject.lcshForensic sciences.
 
dc.titleNew cryptographic schemes with application in network security and computer forensics
 
dc.typePG_Thesis
 
<?xml encoding="utf-8" version="1.0"?>
<item><contributor.advisor>Hui, CK</contributor.advisor>
<contributor.author>Jiang, Lin</contributor.author>
<contributor.author>&#33931;&#29747;</contributor.author>
<date.issued>2010</date.issued>
<language>eng</language>
<publisher>The University of Hong Kong (Pokfulam, Hong Kong)</publisher>
<relation.ispartof>HKU Theses Online (HKUTO)</relation.ispartof>
<rights>The author retains all proprietary rights, (such as patent rights) and the right to use in future works.</rights>
<rights>Creative Commons: Attribution 3.0 Hong Kong License</rights>
<source.uri>http://hub.hku.hk/bib/B44753226</source.uri>
<subject.lcsh>Data encryption (Computer science)</subject.lcsh>
<subject.lcsh>Computer networks - Security measures.</subject.lcsh>
<subject.lcsh>Computer crimes - Investigation.</subject.lcsh>
<subject.lcsh>Computer security.</subject.lcsh>
<subject.lcsh>Forensic sciences.</subject.lcsh>
<title>New cryptographic schemes with application in network security and computer forensics</title>
<type>PG_Thesis</type>
<identifier.hkul>b4475322</identifier.hkul>
<description.thesisname>Doctor of Philosophy</description.thesisname>
<description.thesislevel>doctoral</description.thesislevel>
<description.thesisdiscipline>Computer Science</description.thesisdiscipline>
<description.nature>published_or_final_version</description.nature>
<identifier.doi>10.5353/th_b4475322</identifier.doi>
<date.hkucongregation>2010</date.hkucongregation>
<bitstream.url>http://hub.hku.hk/bitstream/10722/130904/3/FullText.pdf</bitstream.url>
</item>