Author:
Liberatore Marc,Erdely Robert,Kerle Thomas,Levine Brian Neil,Shields Clay
Funder
National Institute of Justice Award
National Science Foundation awards
Subject
Law,Medical Laboratory Technology,Computer Science Applications
Reference15 articles.
1. The trojan horse defense in cybercrime cases;Brenner;Santa Clara Computer and High Technology Law Journal,2004
2. The BitTorrent protocol specification;Cohen,2009
3. Investigating child exploitation and pornography;Ferraro,2005
4. Girault M, Cohen R, Campana M. A generalized birthday attack. In: LNCS on advances in cryptology (EUROCRYPT); 1988, p. 129–56.
5. Don’t cache out your case;Howard;Berkeley Technology Law Journal,2004
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献