Showing results 21 to 40 of 68
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
An e-lottery scheme using Verifiable Random Function Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | ||
Efficient block-based motion segmentation method using motion vector consistency Proceeding/Conference:Proceedings of the IAPR Conference on Machine Vision Applications | 2005 | ||
An efficient bloom filter based solution for multiparty private matching Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06 | 2006 | ||
Empirical evaluation of information leakage detection using net-flow analysis Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | ||
An Empirical Study Profiling Internet Pirates Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2013 | ||
Evaluation of evidence in internet auction fraud investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | ||
An Exploratory Study of Profiling Online Auction Offenders Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
Forensic analysis of a Siemens Programmable Logic Controller Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | ||
Forensic analysis of pirated Chinese Shanzhai mobile phones Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Fragmented JPEG file recovery using pseudo headers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | ||
A Generic Bayesian Belief Model for Similar Cyber Crimes Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2013 | ||
The Hong Kong Telephone Directory Enquiry System Proceeding/Conference:Asia Pacific Software Engineering Conference Proceedings | 1996 | ||
A hybrid approach for authenticating MPEG-2 streaming data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC | 2005 | ||
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA Proceeding/Conference:Frontiers in Artificial Intelligence and Applications | 2014 | ||
Memory acquisition: A 2-Take approach Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
A model for foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | ||
Motion estimation method for blurred videos and application of deblurring with spatially varying blur kernels Proceeding/Conference:Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010 | 2010 | ||
The next generation for the forensic extraction of electronic evidence from mobile telephones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 |