Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

6 results
Keywords : authenticity
Image document

Evaluating the Authenticity of Smartphone Evidence

Heloise Pieterse , Martin Olivier , Renier Van Heerden
13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.41-61, ⟨10.1007/978-3-319-67208-3_3⟩
Conference papers hal-01716408v1
Image document

Forensic Authentication of Bank Checks

Rajesh Kumar , Gaurav Gupta
12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.311-322, ⟨10.1007/978-3-319-46279-0_16⟩
Conference papers hal-01758675v1
Image document

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

Shuhui Hou , Ryoichi Sasaki , Tetsutaro Uehara , Siuming Yiu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers hal-01480187v1
Image document

Guaranteeing Correctness of Bulk Operations in Outsourced Databases

Luca Ferretti , Michele Colajanni , Mirco Marchetti
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.37-51, ⟨10.1007/978-3-319-41483-6_3⟩
Conference papers hal-01633666v1
Image document

Classifying the Authenticity of Evaluated Smartphone Data

Heloise Pieterse , Martin Olivier , Renier Van Heerden
15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.39-57, ⟨10.1007/978-3-030-28752-8_3⟩
Conference papers hal-02534614v1
Image document

A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations

Ju-Sung Kang , Nayoung Kim , Wangho Ju , Ok-Yeon Yi
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.10-23, ⟨10.1007/978-3-662-43826-8_2⟩
Conference papers hal-01400917v1