Digital Signatures for e-Government - A Long-Term Security Architecture (Englisch)
- Neue Suche nach: Błaśkiewicz, Przemysław
- Neue Suche nach: Kubiak, Przemysław
- Neue Suche nach: Kutyłowski, Mirosław
- Neue Suche nach: Błaśkiewicz, Przemysław
- Neue Suche nach: Kubiak, Przemysław
- Neue Suche nach: Kutyłowski, Mirosław
In:
Forensics in Telecommunications, Information, and Multimedia
;
256-270
;
2011
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Digital Signatures for e-Government - A Long-Term Security Architecture
-
Beteiligte:Błaśkiewicz, Przemysław ( Autor:in ) / Kubiak, Przemysław ( Autor:in ) / Kutyłowski, Mirosław ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
On Achieving Encrypted File RecoveryLin, Xiaodong / Zhang, Chenxi / Dule, Theodora et al. | 2011
- 14
-
Behavior Clustering for Anomaly DetectionZhu, Xudong / Li, Hui / Liu, Zhijing et al. | 2011
- 28
-
A Novel Inequality-Based Fragmented File Carving TechniqueYing, Hwei-Ming / Thing, Vrizlynn L. L. et al. | 2011
- 40
-
Using Relationship-Building in Event Profiling for Digital Forensic InvestigationsBatten, Lynn M. / Pan, Lei et al. | 2011
- 53
-
A Novel Forensics Analysis Method for Evidence Extraction from Unallocated SpaceLei, Zhenxing / Dule, Theodora / Lin, Xiaodong et al. | 2011
- 66
-
An Efficient Searchable Encryption Scheme and Its Application in Network ForensicsLin, Xiaodong / Lu, Rongxing / Foxton, Kevin / Shen, Xuemin (Sherman) et al. | 2011
- 79
-
Attacks on BitTorrent – An Experimental StudyKsionsk, Marti / Ji, Ping / Chen, Weifeng et al. | 2011
- 90
-
Network Connections Information Extraction of 64-Bit Windows 7 Memory ImagesWang, Lianhai / Xu, Lijuan / Zhang, Shuhui et al. | 2011
- 99
-
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer OverflowWang, Yong / Gu, Dawu / Xu, Jianping / Wen, Mi / Deng, Liwen et al. | 2011
- 110
-
Investigating the Implications of Virtualization for Digital ForensicsSong, Zheng / Jin, Bo / Zhu, Yinghong / Sun, Yongqing et al. | 2011
- 122
-
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating SystemXu, Lijuan / Wang, Lianhai / Zhang, Lei / Kong, Zhigang et al. | 2011
- 131
-
A Stream Pattern Matching Method for Traffic AnalysisMo, Can / Li, Hui / Zhu, Hui et al. | 2011
- 141
-
Fast in-Place File Carving for Digital ForensicsZha, Xinyan / Sahni, Sartaj et al. | 2011
- 159
-
Live Memory Acquisition through FireWireZhang, Lei / Wang, Lianhai / Zhang, Ruichao / Zhang, Shuhui / Zhou, Yang et al. | 2011
- 168
-
Digital Forensic Analysis on Runtime Instruction FlowLi, Juanru / Gu, Dawu / Deng, Chaoguo / Luo, Yuhao et al. | 2011
- 179
-
Enhance Information Flow Tracking with Function RecognitionZhou, Kan / Huang, Shiqiu / Qi, Zhengwei / Gu, Jian / Shen, Beijun et al. | 2011
- 185
-
A Privilege Separation Method for Security Commercial TransactionsChen, Yasha / Hu, Jun / Gai, Xinmao / Sun, Yu et al. | 2011
- 193
-
Data Recovery Based on Intelligent Pattern MatchingYi, JunKai / Tang, Shuo / Li, Hui et al. | 2011
- 200
-
Study on Supervision of Integrity of Chain of Custody in Computer ForensicsWang, Yi et al. | 2011
- 207
-
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent VehiclesAl-Kuwari, Saif / Wolthusen, Stephen D. et al. | 2011
- 224
-
Research and Review on Computer ForensicsGuo, Hong / Jin, Bo / Huang, Daoli et al. | 2011
- 234
-
Text Content Filtering Based on Chinese Character Reconstruction from RadicalsHe, Wenlei / Liu, Gongshen / Luo, Jun / Lin, Jiuchuan et al. | 2011
- 241
-
Disguisable Symmetric Encryption Schemes for an Anti-forensics PurposeDing, Ning / Gu, Dawu / Liu, Zhiqiang et al. | 2011
- 256
-
Digital Signatures for e-Government - A Long-Term Security ArchitectureBłaśkiewicz, Przemysław / Kubiak, Przemysław / Kutyłowski, Mirosław et al. | 2011
- 271
-
SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web ApplicationsWu, Beihua et al. | 2011
- 277
-
On Different Categories of Cybercrime in ChinaXu, Aidong / Gong, Yan / Wang, Yongquan / Ai, Nayan et al. | 2011
- 282
-
Face and Lip Tracking for Person IdentificationZhang, Ying et al. | 2011
- 287
-
An Anonymity Scheme Based on Pseudonym in P2P NetworksPeng, Hao / Lu, Songnian / Li, Jianhua / Zhang, Aixin / Zhao, Dandan et al. | 2011
- 294
-
Research on the Application Security Isolation ModelGong, Lei / Zhao, Yong / Liao, Jianhua et al. | 2011
- 301
-
Analysis of Telephone Call Detail Records Based on Fuzzy Decision TreeDing, Liping / Gu, Jian / Wang, Yongji / Wu, Jingzheng et al. | 2011