Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 91 to 110 of 113 < previous   next >
TitleAuthor(s)Issue Date
 
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms
Proceeding/Conference:Public Key Cryptography. PKC 2000
2000
Security issues and challenges for cyber physical system
Proceeding/Conference:Proceedings - 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010
2010
Sensitivity analysis for a Bitcoin simulation model
Proceeding/Conference:Forensic Science International
2022
 
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence
Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010
2010
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
Sockpuppet detection in online discussion forums
Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
2011
 
Software pirates: a criminal investigation
Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012
2012
 
Strong Cryptographic Library - Implementation and Applications
Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference
1999
 
Super-resolution of faces using texture mapping on a generic 3D model
Proceeding/Conference:International Conference on Image and Graphics Proceedings
2009
 
Temporal analysis of HFS+ and Mac OS X in digital investigations
Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012
2012
The cloud storage ecosystem – A new business model for internet piracy?
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
 
Threat analysis of an elevator control system
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2017
 
Time and Location Topic Model for analyzing Linkg forum data
Proceeding/Conference:2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE)
2020
Tools and technology for computer forensics: Research and development in Hong Kong (invited paper)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Towards a better similarity measure for keyword profiling via clustering
Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings
2013
 
Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
Two improved partially blind signature schemes from bilinear pairings
Proceeding/Conference:Lecture Notes in Computer Science
2005
 
Validation of rules used in foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Validation Rules for Enhancing Foxy P2P Network Investigations
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
Very Fast Telephone Directory Search using Large Memory Resident Data Structures
Proceeding/Conference:Proceedings of the IASTED Conference on Software Engineering (SE'98)
1998