Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 50 to 67 of 67 < previous 
TitleAuthor(s)Issue Date
 
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms
Proceeding/Conference:Public Key Cryptography. PKC 2000
2000
Sensitivity analysis for a Bitcoin simulation model
Proceeding/Conference:Forensic Science International
2022
 
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence
Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010
2010
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
Sockpuppet detection in online discussion forums
Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
2011
 
Software pirates: a criminal investigation
Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012
2012
 
Strong Cryptographic Library - Implementation and Applications
Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference
1999
 
Temporal analysis of HFS+ and Mac OS X in digital investigations
Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012
2012
The cloud storage ecosystem – A new business model for internet piracy?
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
Tools and technology for computer forensics: Research and development in Hong Kong (invited paper)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Towards a better similarity measure for keyword profiling via clustering
Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings
2013
Two improved partially blind signature schemes from bilinear pairings
Proceeding/Conference:Lecture Notes in Computer Science
2005
 
Validation of rules used in foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Validation Rules for Enhancing Foxy P2P Network Investigations
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
Very Fast Telephone Directory Search using Large Memory Resident Data Structures
Proceeding/Conference:Proceedings of the IASTED Conference on Software Engineering (SE'98)
1998
 
Watershed segmentation with boundary curvature ratio based merging criterion
Proceeding/Conference:Proceedings of the 9th IASTED International Conference on Signal and Image Processing
2007
 
Web User Profiling and Identification Based on Browsing Behavior Analysis
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
2001