Search for persons
X
?
Lecture Notes in Computer Science; Human-Computer Interaction ,
1
Supporting and Motivating Re-integration of Justice-Involve..:
, In:
?
2020 8th International Symposium on Digital Forensics and Security (ISDFS) ,
3
Analysis of iOS SQLite Schema Evolution for Updating Forens..:
, In:
?
Advances in Digital Forensics XV; IFIP Advances in Information and Communication Technology ,
5
A Targeted Data Extraction System for Mobile Devices:
, In:
?
Proceedings of the 28th Annual Computer Security Applications Conference ,
7
Building better passwords using probabilistic techniques:
, In:
?
Proceedings of the 17th ACM conference on Computer and communications security ,
8
Testing metrics for password creation policies by attacking..:
, In:
?
Proceedings of the 2009 ACM symposium on Applied Computing ,
12
Incorporating accountability into internet email:
, In:
?
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) ,
14