Filter your results
- 14
- 14
- 14
- 1
- 1
- 1
- 2
- 5
- 1
- 1
- 2
- 14
- 2
- 1
- 1
- 7
- 5
- 5
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
14 results
|
|
sorted by
|
|
Robust Hash Algorithms for Text14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.135-144, ⟨10.1007/978-3-642-40779-6_11⟩
Conference papers
hal-01492815v1
|
||
|
Comparison of cyber attacks on services in the clearnet and darknet17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.39-61, ⟨10.1007/978-3-030-88381-2_3⟩
Conference papers
hal-03764381v1
|
||
|
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.75-80, ⟨10.1007/978-3-642-13241-4_8⟩
Conference papers
hal-01056366v1
|
||
|
On the Creation of Reliable Digital Evidence8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.3-17, ⟨10.1007/978-3-642-33962-2_1⟩
Conference papers
hal-01523718v1
|
||
|
Hash-Based File Content Identification Using Distributed Systems9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.119-134, ⟨10.1007/978-3-642-41148-9_8⟩
Conference papers
hal-01460625v1
|
||
|
Automating Video File Carving and Content Identification9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.195-212, ⟨10.1007/978-3-642-41148-9_14⟩
Conference papers
hal-01460607v1
|
||
|
Data Corpora for Digital Forensics Education and Research10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.309-325, ⟨10.1007/978-3-662-44952-3_21⟩
Conference papers
hal-01393787v1
|
||
|
Preserving Confidentiality in Component Compositions12th International Conference on Software Composition (SC), Jun 2013, Budapest, Hungary. pp.33-48, ⟨10.1007/978-3-642-39614-4_3⟩
Conference papers
hal-01492775v1
|
||
|
Detecting Fraud Using Modified Benford Analysis7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.129-141, ⟨10.1007/978-3-642-24212-0_10⟩
Conference papers
hal-01569557v1
|
||
|
Trust in Peer-to-Peer Content Distribution Protocols4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.76-89, ⟨10.1007/978-3-642-12368-9_6⟩
Conference papers
hal-01056065v1
|
||
|
Using Approximate Matching to Reduce the Volume of Digital Data10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.149-163, ⟨10.1007/978-3-662-44952-3_11⟩
Conference papers
hal-01393769v1
|
||
|
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.95-104, ⟨10.1007/978-3-642-40779-6_7⟩
Conference papers
hal-01492836v1
|
||
|
A Novel Approach for Generating Synthetic Datasets for Digital Forensics16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.73-93, ⟨10.1007/978-3-030-56223-6_5⟩
Conference papers
hal-03657236v1
|
||
|
How Current Android Malware Seeks to Evade Automated Code Analysis9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers
hal-01442542v1
|