A context-centered methodology for IoT forensic investigations (English)
- New search for: Castelo Gómez, Juan Manuel
- Further information on Castelo Gómez, Juan Manuel:
- https://orcid.org/0000-0001-6117-482X
- New search for: Carrillo Mondéjar, Javier
- New search for: Roldán Gómez, José
- New search for: Martínez Martínez, José Luis
- New search for: Castelo Gómez, Juan Manuel
- Further information on Castelo Gómez, Juan Manuel:
- https://orcid.org/0000-0001-6117-482X
- New search for: Carrillo Mondéjar, Javier
- New search for: Roldán Gómez, José
- New search for: Martínez Martínez, José Luis
In:
International Journal of Information Security
;
20
, 5
; 647-673
;
2020
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:A context-centered methodology for IoT forensic investigations
-
Contributors:Castelo Gómez, Juan Manuel ( author ) / Carrillo Mondéjar, Javier ( author ) / Roldán Gómez, José ( author ) / Martínez Martínez, José Luis ( author )
-
Published in:International Journal of Information Security ; 20, 5 ; 647-673
-
Publisher:
- New search for: Springer Berlin Heidelberg
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2020
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.38$jComputersicherheit / 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38$jComputersicherheit / 54.38 Computersicherheit -
Source:
Table of contents – Volume 20, Issue 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 647
-
A context-centered methodology for IoT forensic investigationsCastelo Gómez, Juan Manuel / Carrillo Mondéjar, Javier / Roldán Gómez, José / Martínez Martínez, José Luis et al. | 2020
- 675
-
Password-authenticated searchable encryptionChen, Liqun / Huang, Kaibin / Manulis, Mark / Sekar, Venkkatesh et al. | 2020
- 695
-
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middlewareSicari, Sabrina / Rizzardi, Alessandra / Dini, Gianluca / Perazzo, Pericle / La Manna, Michele / Coen-Porisini, Alberto et al. | 2020
- 715
-
An efficient privacy-preserving pay-by-phone system for regulated parking areasBorges, Ricard / Sebé, Francesc et al. | 2020
- 729
-
Evaluating card-based protocols in terms of execution timeMiyahara, Daiki / Ueda, Itaru / Hayashi, Yu-ichi / Mizuki, Takaaki / Sone, Hideaki et al. | 2020
- 741
-
DEALER: decentralized incentives for threat intelligence reporting and exchangeMenges, Florian / Putz, Benedikt / Pernul, Günther et al. | 2020
- 763
-
Enhanced models for privacy and utility in continuous-time diffusion networksGranese, Federica / Gorla, Daniele / Palamidessi, Catuscia et al. | 2021