Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 73 to 92 of 113 < previous   next >
TitleAuthor(s)Issue Date
 
Photo forensics on shanzhai mobile phone
Proceeding/Conference:Lecture Notes in Computer Science
2013
 
PLC Forensics Based On Control Program Logic Change Detection
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
Privacy preserving confidential forensic investigation for shared or remote servers
Proceeding/Conference:Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
2011
Privacy preserving multiple keyword search for confidential investigation of remote forensics
Proceeding/Conference:Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011
2011
Privacy reference monitor - A computer model for law compliant privacy protection
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2009
 
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII
Proceeding/Conference:Conference on Computerization of Law via the Internet
2003
 
Profiling and tracking a cyberlocker link sharer in a public forum
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
Profiling flash mob organizers in web discussion forums
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
Protecting digital data privacy in Computer Forensic Examination
Proceeding/Conference:IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011
2011
 
Protecting digital legal professional privilege LPP data
Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008
2008
Quantification of digital forensic hypotheses using probability theory
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
2013
 
Railway track possessing assigning using constraint satisfaction
Proceeding/Conference:Asian'96 Post Conference Workshop on Constraints and Constraint Programming
1996
 
Real-time multiple head shape detection and tracking system with decentralized trackers
Proceeding/Conference:International Conference on Intelligent System Design and Applications Proceedings
2006
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP - The International Federation for Information Processing
2008
Recovery of heavily fragmented JPEG files
Proceeding/Conference:Digital Investigation
2016
Risk management of corporate confidential information in digital form
Proceeding/Conference:Proceedings - International Computer Software and Applications Conference
2004
The rules of time on NTFS file system
Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering
2007
 
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms
Proceeding/Conference:Public Key Cryptography. PKC 2000
2000
Security issues and challenges for cyber physical system
Proceeding/Conference:Proceedings - 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010
2010