Showing results 9 to 19 of 19
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
K-Dimensional hashing scheme for hard disk integrity verification in computer forensics Journal:Journal of Zhejiang University: Science C | 2011 | ||
A key-recovery system for long-term encrypted documents Proceeding/Conference:Proceedings - 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW2006 | 2006 | ||
Maintaining hard disk integrity with digital legal professional privilege (LPP) data Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
2019 | |||
Photo forensics on shanzhai mobile phone Proceeding/Conference:Lecture Notes in Computer Science | 2013 | ||
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating Journal:Journal of Network and Computer Applications | 2018 | ||
Protecting digital legal professional privilege LPP data Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008 | 2008 | ||
Secure chained threshold proxy signature without and with supervision Journal:Journal of Software Engineering and Applications | 2009 | ||
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM Proceeding/Conference:Proceeding-SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing | 2017 | ||
Secure end-to-end browsing system with mobile composition Proceeding/Conference:International Conference on Internet Technology and Applications (iTAP) | 2011 | ||
SPECS: Secure and privacy enhancing communications schemes for VANETs Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2010 |