Author:
Yampolskiy Roman V.,Rebolledo-Mendez Jovan D.,Hindi Musa M.
Publisher
Springer Berlin Heidelberg
Reference44 articles.
1. Lecture Notes in Computer Science;M. Naor,1995
2. Rong-Jian, C., Yuan-Hsin, C., Chao-Shen, C., Jui-Lin, L.: Image Encryption/Decryption System using 2-D Cellular Automata. In: Proceedings of the IEEE Tenth International Symposium on Consumer Electronics (ISCE 2006), St. Petersburg, Russia, pp. 1–6 (2006)
3. Abboud, G., Marean, J., Yampolskiy, R.V.: Steganography and Visual Cryptography in Computer Forensics. In: Proceedings of the Fifth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, USA, pp. 25–32 (2010)
4. Losavio, M., Hindi, M., Yampolskiy, R., Wilson Keeling, D.: Boundary Conditions for the Digital Forensic Use of Electronic Evidence and the Need for Forensic Counter-Analysis. In: Proceedings of the Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), in Conjunction with IEEE Security and Privacy Symposium, Oakland, USA, pp. 1–6 (2010)
5. Arazi, B., Dinstein, I.H., Kafri, O.: Intuition, perception, and secure communication. IEEE Transactions on Systems, Man and Cybernetics 19(5), 1016–1020 (1989)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献