Author of the publication

Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm.

, , , , , and . Int. J. Electron. Secur. Digit. Forensics, 2 (1): 18-28 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

2D Color Barcodes for Mobile Phones., , , and . Int. J. Comput. Sci. Appl., 8 (1): 136-155 (2011)The Competitor Busting Strategy in Keyword Auctions: Who's Worst Hit?, , , , and . CNSR, page 153-160. IEEE Computer Society, (2011)SAVED: Secure Android Value addED services., , , , and . MobiCASE, volume 76 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 415-427. Springer, (2010)Shared Backup & Restore: Save, Recover and Share Personal Information into Closed Groups of Smartphones., , , , and . NTMS, page 1-5. IEEE, (2011)High Capacity Colored Two Dimensional Codes., , , and . IMCSIT, page 709-716. IEEE, (2010)SecureMyDroid: enforcing security in the mobile devices lifecycle., , , and . CSIIRW, page 27. ACM, (2010)A Model for the Dynamics of Bidders in the Simulation of Keyword Auctions., , , , and . UKSim, page 440-445. IEEE Computer Society, (2011)B-POS Secure Mobile Payment System.. Encyclopedia of Information Ethics and Security, IGI Global, (2007)Transaction Oriented Text Messaging with Trusted-SMS., , , and . ACSAC, page 485-494. IEEE Computer Society, (2008)A Sketch-Based Architecture for Mining Frequent Items and Itemsets from Distributed Data Streams., , , and . CCGRID, page 245-253. IEEE Computer Society, (2011)