Cargando…

Forensics in Telecommunications, Information and Multimedia Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009. The focus of this year's conference has shifted to th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sorell, Matthew (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 8
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-02312-5
003 DE-He213
005 20220114080513.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642023125  |9 978-3-642-02312-5 
024 7 |a 10.1007/978-3-642-02312-5  |2 doi 
050 4 |a K564.C6 
072 7 |a UBL  |2 bicssc 
072 7 |a LAW099000  |2 bisacsh 
072 7 |a UBL  |2 thema 
082 0 4 |a 343.0999  |2 23 
245 1 0 |a Forensics in Telecommunications, Information and Multimedia  |h [electronic resource] :  |b Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers /  |c edited by Matthew Sorell. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XII, 224 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,  |x 1867-822X ;  |v 8 
505 0 |a A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network -- A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network -- Forensics for Detecting P2P Network Originated MP3 Files on the User Device -- Image Encryption Using Chaotic Signal and Max-Heap Tree -- Investigating Encrypted Material -- Legal and Technical Implications of Collecting Wireless Data as an Evidence Source -- Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt -- Robust Correctness Testing for Digital Forensic Tools -- Surveillance Applications of Biologically-Inspired Smart Cameras -- The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems -- FIA: An Open Forensic Integration Architecture for Composing Digital Evidence -- Distinguishing between Camera and Scanned Images by Means of Frequency Analysis -- Developing Speaker Recognition System: From Prototype to Practical Application -- A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC -- A Provable Security Scheme of ID-Based Threshold Decryption -- Analysis of Sensor Photo Response Non-Uniformity in RAW Images -- Audit Log for Forensic Photography -- Authenticating Medical Images through Repetitive Index Modulation Based Watermarking -- Cyber Forensics Ontology for Cyber Criminal Investigation -- Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis -- Detection of Block Artifacts for Digital Forensic Analysis -- Vocal Forgery in Forensic Sciences -- International Workshop on e-Forensics Law -- Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights -- Digital Identity - The Legal Person? -- Surveillance and Datenschutz in Virtual Environments. 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009. The focus of this year's conference has shifted to the legal rather than the deeply technical especially by incorporating the International Workshop on e-Forensics. The 21 papers deal with legal issues covering voice and telephony, image source identification and authentication, investigative practice, and applications including surveillance. 
650 0 |a Computers-Law and legislation. 
650 0 |a Information technology-Law and legislation. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Pattern recognition systems. 
650 0 |a Computers and civilization. 
650 0 |a Biometric identification. 
650 0 |a Law. 
650 1 4 |a Legal Aspects of Computing. 
650 2 4 |a Cryptology. 
650 2 4 |a Automated Pattern Recognition. 
650 2 4 |a Computers and Society. 
650 2 4 |a Biometrics. 
650 2 4 |a Law. 
700 1 |a Sorell, Matthew.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642023132 
776 0 8 |i Printed edition:  |z 9783642023118 
830 0 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,  |x 1867-822X ;  |v 8 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-02312-5  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)