Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009. The focus of this year's conference has shifted to th...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sorell, Matthew (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Σειρά:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 8
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04506nam a22005655i 4500
001 978-3-642-02312-5
003 DE-He213
005 20151204172456.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642023125  |9 978-3-642-02312-5 
024 7 |a 10.1007/978-3-642-02312-5  |2 doi 
040 |d GrThAP 
050 4 |a QA75.5-76.95 
072 7 |a UBL  |2 bicssc 
072 7 |a LAW099000  |2 bisacsh 
082 0 4 |a 343.0999  |2 23 
245 1 0 |a Forensics in Telecommunications, Information and Multimedia  |h [electronic resource] :  |b Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /  |c edited by Matthew Sorell. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2009. 
300 |a X, 221 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,  |x 1867-8211 ;  |v 8 
505 0 |a A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network -- A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network -- Forensics for Detecting P2P Network Originated MP3 Files on the User Device -- Image Encryption Using Chaotic Signal and Max–Heap Tree -- Investigating Encrypted Material -- Legal and Technical Implications of Collecting Wireless Data as an Evidence Source -- Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt -- Robust Correctness Testing for Digital Forensic Tools -- Surveillance Applications of Biologically-Inspired Smart Cameras -- The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems -- FIA: An Open Forensic Integration Architecture for Composing Digital Evidence -- Distinguishing between Camera and Scanned Images by Means of Frequency Analysis -- Developing Speaker Recognition System: From Prototype to Practical Application -- A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC -- A Provable Security Scheme of ID-Based Threshold Decryption -- Analysis of Sensor Photo Response Non-Uniformity in RAW Images -- Audit Log for Forensic Photography -- Authenticating Medical Images through Repetitive Index Modulation Based Watermarking -- Cyber Forensics Ontology for Cyber Criminal Investigation -- Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis -- Detection of Block Artifacts for Digital Forensic Analysis -- Vocal Forgery in Forensic Sciences -- International Workshop on e-Forensics Law -- Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights -- Digital Identity – The Legal Person? -- Surveillance and Datenschutz in Virtual Environments. 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009. The focus of this year's conference has shifted to the legal rather than the deeply technical especially by incorporating the International Workshop on e-Forensics. The 21 papers deal with legal issues covering voice and telephony, image source identification and authentication, investigative practice, and applications including surveillance. 
650 0 |a Computer science. 
650 0 |a Data encryption (Computer science). 
650 0 |a Pattern recognition. 
650 0 |a Biometrics (Biology). 
650 0 |a Computers and civilization. 
650 0 |a Computers. 
650 0 |a Law and legislation. 
650 0 |a Law. 
650 1 4 |a Computer Science. 
650 2 4 |a Legal Aspects of Computing. 
650 2 4 |a Data Encryption. 
650 2 4 |a Pattern Recognition. 
650 2 4 |a Computers and Society. 
650 2 4 |a Biometrics. 
650 2 4 |a Law, general. 
700 1 |a Sorell, Matthew.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642023118 
830 0 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,  |x 1867-8211 ;  |v 8 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-02312-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)