About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2009
E-FORENSICSLAW 2009
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement
Back to LNICST

    E-FORENSICS

    Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

    The aim of this conference is to bring together state of the art research contributions in the development of tools, protocols and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices. Investigative practice an…

    The aim of this conference is to bring together state of the art research contributions in the development of tools, protocols and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices. Investigative practice and requirements for presentation of evidence in court are to be considered key underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Matthew Sorell (University of Adelaide)
    Publisher
    Springer
    ISBN
    978-3-642-02312-5
    Series
    LNICST
    Conference dates
    19th–21st Jan 2009
    Location
    Adelaide, Australia
    Appeared in EUDL
    2012-05-11

    Copyright © 2012–2025 ICST

    Ordered by title or year
    Showing 1–10 of 21 results
    Page size: 102550
    • 1
    • 2
    • 3
    • Next
    • Last
    • Cyber Forensics Ontology for Cyber Criminal Investigation

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Heum Park, SunHo Cho, Hyuk-Chul Kwon
    • Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      M. Wong, Antionette Goh, Hong Chua
    • Investigating Encrypted Material

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Niall McGrath, Pavel Gladyshev, Tahar Kechadi, Joe Carthy
    • Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Yue Li, Chang-Tsun Li
    • Legal and Technical Implications of Collecting Wireless Data as an Evidence Source

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Benjamin Turnbull, Grant Osborne, Matthew Simon
    • Robust Correctness Testing for Digital Forensic Tools

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Lei Pan, Lynn Batten
    • Surveillance Applications of Biologically-Inspired Smart Cameras

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Kosta Haltis, Lee Andersson, Matthew Sorell, Russell Brinkworth
    • Image Encryption Using Chaotic Signal and Max–Heap Tree

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri
    • A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Trupti Shiralkar, Michael Lavine, Benjamin Turnbull
    • A Provable Security Scheme of ID-Based Threshold Decryption

      Research Article in Forensics in Telecommunications, Information and Multimedia. Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers

      Wang Xue-Guang, Chai Zhen-Chuan
    • 1
    • 2
    • 3
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL