Author of the publication

Criminal Exploitation of Online Systems by Organised Crime Groups

, and . Asian Journal of Criminology, (2008)10.1007/s11417-007-9035-y.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Criminal Exploitation of Online Systems by Organised Crime Groups, and . Asian Journal of Criminology, (2008)10.1007/s11417-007-9035-y.Organised crime groups in cyberspace: a typology. Trends in Organized Crime, (2008)10.1007/s12117-008-9038-9.Digital Camcorder Forensics., , and . AISC, volume 138 of CRPIT, page 39-48. Australian Computer Society, (2013)Parking Management: A Blockchain-Based Privacy-Preserving System., , , and . IEEE Consumer Electronics Magazine, 8 (4): 45-49 (2019)Information privacy in online social networks: Uses and gratification perspective., , and . Comput. Hum. Behav., (2018)CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles., , , and . IEEE Internet of Things Journal, 6 (6): 10332-10343 (2019)Blockchain based searchable encryption for electronic health record sharing., , , , and . Future Gener. Comput. Syst., (2019)Efficiently and securely harnessing cloud to solve linear regression and other matrix operations., , and . Future Gener. Comput. Syst., (2018)Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps., and . Future Gener. Comput. Syst., (2018)A technique to circumvent SSL/TLS validations on iOS devices., and . Future Gener. Comput. Syst., (2017)