Message from EAI President regarding COVID-19
Register | Login

EUDL

European Union Digital Library
Proceedings Series Journals Search EAI
E-FORENSICS 2010
E-FORENSICSLAW 2010
Other Years
Ethics and Malpractice Statement

    E-FORENSICSLAW

    2nd International ICST Workshop on e-Forensics Law and Judicial

    The 2nd International ICST Workshop on e-Forensics Law and Judicial Expertise (to be held on Wednesday 10 November 2010) will focus on the legal and regulatory aspects of e-Evidence (digital evidence) and e-Forensics and judicial expertise in telecommunications, information and multimedia.

    The 2nd International ICST Workshop on e-Forensics Law and Judicial Expertise (to be held on Wednesday 10 November 2010) will focus on the legal and regulatory aspects of e-Evidence (digital evidence) and e-Forensics and judicial expertise in telecommunications, information and multimedia.

    more »
    Editor(s): Xuejia Lai (Shanghai Jiao Tong University, China), Dawu Gu (Shanghai Jiao Tong University, China), Bo Jin (The 3rd Research Institute of Ministry of Public Security), Yongquan Wang (East China University of Political Science and Law) and Hui Li (Xidian University, China)
    Publisher
    Springer
    Conference dates
    10th Nov 2010
    Location
    Shanghai, China
    Appeared in EUDL
    2012-02-03

    Copyright © 2012–2023 ICST

    Ordered by title or year
    Showing 1–5 of 5 results
    Page size: 102550
    • 1
    • An Anonymity Scheme Based on Pseudonym in P2P Networks

      Research Article in 2nd International ICST Workshop on e-Forensics Law and Judicial

      Hao Peng, Songnian Lu, Jianhua Li, Aixin Zhang, Dandan Zhao
    • Face and Lip Tracking for Person Identification

      Research Article in 2nd International ICST Workshop on e-Forensics Law and Judicial

      Ying Zhang
    • On Different Categories of Cybercrime in China

      Research Article in 2nd International ICST Workshop on e-Forensics Law and Judicial

      Aidong Xu, Yan Gong, Yongquan Wang, Nayan Ai
    • Research on the Application Security Isolation Model

      Research Article in 2nd International ICST Workshop on e-Forensics Law and Judicial

      Lei Gong, Yong Zhao, Jianhua Liao
    • SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web Applications

      Research Article in 2nd International ICST Workshop on e-Forensics Law and Judicial

      Beihua Wu
    • 1
    About | Contact Us
    EBSCOProQuestDBLPDOAJPortico