Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 16 to 35 of 68 < previous   next >
TitleAuthor(s)Issue Date
 
Delegation of Signing and Decryption Rights using PKI Proxy Memo
Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering
2004
 
Design of a Cyber Forensic Tool
Proceeding/Conference:International Transnational Organized Crime Conference
2002
 
The Differential Analysis of Reduced Skijack Variants from The First Round
Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference
2002
A dual cube hashing scheme for solving LPP integrity problem
Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings
2011
Dynamic integrity verification for software self-defense
Proceeding/Conference:Proceedings of The 2005 International Conference on Security and Management, SAM'05
2005
An e-lottery scheme using Verifiable Random Function
Proceeding/Conference:Lecture Notes in Computer Science
2005
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
Efficient block-based motion segmentation method using motion vector consistency
Proceeding/Conference:Proceedings of the IAPR Conference on Machine Vision Applications
2005
An efficient bloom filter based solution for multiparty private matching
Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06
2006
 
Empirical evaluation of information leakage detection using net-flow analysis
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
An Empirical Study Profiling Internet Pirates
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
Evaluation of evidence in internet auction fraud investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
 
An Exploratory Study of Profiling Online Auction Offenders
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
Forensic analysis of a Siemens Programmable Logic Controller
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
 
Forensic analysis of pirated Chinese Shanzhai mobile phones
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Fragmented JPEG file recovery using pseudo headers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
A Generic Bayesian Belief Model for Similar Cyber Crimes
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
 
The Hong Kong Telephone Directory Enquiry System
Proceeding/Conference:Asia Pacific Software Engineering Conference Proceedings
1996
A hybrid approach for authenticating MPEG-2 streaming data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC
2005