Showing results 63 to 69 of 69
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
Two improved partially blind signature schemes from bilinear pairings Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Validation of rules used in foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Validation Rules for Enhancing Foxy P2P Network Investigations Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
Very Fast Telephone Directory Search using Large Memory Resident Data Structures Proceeding/Conference:Proceedings of the IASTED Conference on Software Engineering (SE'98) | 1998 | ||
Watershed segmentation with boundary curvature ratio based merging criterion Proceeding/Conference:Proceedings of the 9th IASTED International Conference on Signal and Image Processing | 2007 | ||
Web User Profiling and Identification Based on Browsing Behavior Analysis Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
What an Investigator Needs to Know about Encryption & Tracking Technologies Proceeding/Conference:Asia Cyber Crime Summit | 2001 |