Search - Information and Communication Technology Access content directly

Filter your results

2 results
Image document

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

Shuhui Hou , Ryoichi Sasaki , Tetsutaro Uehara , Siuming Yiu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers hal-01480187v1
Image document

A Proposal on Security Case Based on Common Criteria

Shuichiro Yamamoto , Tomoko Kaneko , Hidehiko Tanaka
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.331-336, ⟨10.1007/978-3-642-36818-9_36⟩
Conference papers hal-01480190v1