About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
E-FORENSICS 2010
E-FORENSICSLAW 2010
Other Years
E-FORENSICS 2008E-FORENSICS 2009E-FORENSICS 2010
Ethics and Malpractice Statement

    E-FORENSICS

    Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentatio…

    This conference aims to bring together the research contributions in the development of tools and techniques which assist in the investigation of potentially illegal activity associated with electronic communication and electronic devices, and investigative practice and requirements for presentation of evidence in court are to be considered as the underlying themes. This might include discovery, analysis, handling and storage of digital evidence; meeting the legal burden of proof; and the establishment of the forensic chain of evidence.

    more »
    Editor(s): Xuejia Lai (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University), Bo Jin (The 3rd Research Institute of Ministry of Public Security), Yongquan Wang (East China University of Political Science and Law) and Hui Li (Xidian University)
    Publisher
    Springer
    ISBN
    978-3-642-23602-0
    Series
    LNICST
    Conference dates
    11th–12th Nov 2010
    Location
    Shanghai, China
    Appeared in EUDL
    2012-10-10

    Copyright © 2012–2025 ICST

    Ordered by title or year
    Showing 11–20 of 25 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • 3
    • Next
    • Last
    • An Efficient Searchable Encryption Scheme and Its Application in Network Forensics

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Xiaodong Lin, Rongxing Lu, Kevin Foxton, Xuemin Shen
    • Attacks on BitTorrent – An Experimental Study

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Marti Ksionsk, Ping Ji, Weifeng Chen
    • Enhance Information Flow Tracking with Function Recognition

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Kan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen
    • On Achieving Encrypted File Recovery

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Xiaodong Lin, Chenxi Zhang, Theodora Dule
    • Research and Review on Computer Forensics

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Hong Guo, Bo Jin, Daoli Huang
    • A Privilege Separation Method for Security Commercial Transactions

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Yasha Chen, Jun Hu, Xinmao Gai, Yu Sun
    • Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Lijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong
    • Digital Forensic Analysis on Runtime Instruction Flow

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo
    • Digital Signatures for e-Government - A Long-Term Security Architecture

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Przemysław Błaśkiewicz, Przemysław Kubiak, Mirosław Kutyłowski
    • Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose

      Research Article in Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

      Ning Ding, Dawu Gu, Zhiqiang Liu
    • First
    • Previous
    • 1
    • 2
    • 3
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL