Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 21 to 40 of 68 < previous   next >
TitleAuthor(s)Issue Date
An e-lottery scheme using Verifiable Random Function
Proceeding/Conference:Lecture Notes in Computer Science
2005
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
Efficient block-based motion segmentation method using motion vector consistency
Proceeding/Conference:Proceedings of the IAPR Conference on Machine Vision Applications
2005
An efficient bloom filter based solution for multiparty private matching
Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06
2006
 
Empirical evaluation of information leakage detection using net-flow analysis
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
An Empirical Study Profiling Internet Pirates
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
Evaluation of evidence in internet auction fraud investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
 
An Exploratory Study of Profiling Online Auction Offenders
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
Forensic analysis of a Siemens Programmable Logic Controller
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
 
Forensic analysis of pirated Chinese Shanzhai mobile phones
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Fragmented JPEG file recovery using pseudo headers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
A Generic Bayesian Belief Model for Similar Cyber Crimes
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
 
The Hong Kong Telephone Directory Enquiry System
Proceeding/Conference:Asia Pacific Software Engineering Conference Proceedings
1996
A hybrid approach for authenticating MPEG-2 streaming data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC
2005
 
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA
Proceeding/Conference:Frontiers in Artificial Intelligence and Applications
2014
 
Memory acquisition: A 2-Take approach
Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009
2009
 
A model for foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
Motion estimation method for blurred videos and application of deblurring with spatially varying blur kernels
Proceeding/Conference:Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010
2010
The next generation for the forensic extraction of electronic evidence from mobile telephones
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
2013