Author of the publication

Automatic, Selective and Secure Deletion of Digital Evidence.

, , , and . BWCCA, page 392-398. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic, Selective and Secure Deletion of Digital Evidence., , , and . BWCCA, page 392-398. IEEE Computer Society, (2011)The AVQ Algorithm: Watermarking and Compression Performances., , , and . INCoS, page 698-702. IEEE Computer Society, (2011)Forensically-Sound Methods to Collect Live Network Evidence., , , and . AINA, page 405-412. IEEE Computer Society, (2013)On the Construction of a False Digital Alibi on the Android OS., , , , and . INCoS, page 685-690. IEEE Computer Society, (2011)The Forensic Analysis of a False Digital Alibi., , , , , and . IMIS, page 114-121. IEEE Computer Society, (2012)Automated Construction of a False Digital Alibi., , , , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 359-373. Springer, (2011)A Review of Security Attacks on the GSM Standard., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 507-512. Springer, (2013)PExy: The Other Side of Exploit Kits., , , , and . DIMVA, volume 8550 of Lecture Notes in Computer Science, page 132-151. Springer, (2014)SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks., , , and . IMIS, page 520-526. IEEE Computer Society, (2011)