Filter your results
- 6
- 6
- 6
- 1
- 1
- 1
- 2
- 1
- 1
- 6
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Evaluating the Authenticity of Smartphone Evidence13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.41-61, ⟨10.1007/978-3-319-67208-3_3⟩
Conference papers
hal-01716408v1
|
||
|
Forensic Authentication of Bank Checks12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.311-322, ⟨10.1007/978-3-319-46279-0_16⟩
Conference papers
hal-01758675v1
|
||
|
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers
hal-01480187v1
|
||
|
Guaranteeing Correctness of Bulk Operations in Outsourced Databases30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.37-51, ⟨10.1007/978-3-319-41483-6_3⟩
Conference papers
hal-01633666v1
|
||
|
Classifying the Authenticity of Evaluated Smartphone Data15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.39-57, ⟨10.1007/978-3-030-28752-8_3⟩
Conference papers
hal-02534614v1
|
||
|
A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.10-23, ⟨10.1007/978-3-662-43826-8_2⟩
Conference papers
hal-01400917v1
|