Author of the publication

Law Enforcement Access to Password Protected and/or Encrypted Mobile Data.

. ARES, page 399-405. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regulation of State Surveillance of the Internet.. ISSE, page 415-425. Vieweg, (2006)The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism.. J. Digit. Forensics Secur. Law, 2 (2): 41-56 (2007)Restricting Excessive State-on-State Cyber Espionage under International Law: A Quest of Futility?. ISSE, page 134-143. Springer, (2014)Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis.. ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 130-143. Springer, (2013)Challenges pertaining to cyber war under international law.. CyberSec, page 1-5. IEEE, (2014)The Legal Conflict between Security and Privacy in Addressing Crime and Terrorism on the Internet.. ISSE, page 26-37. Vieweg+Teubner, (2007)State-on-nationals' electronic communication surveillance in South Africa: A murky legal landscape to navigate?. ISSA, page 1-6. IEEE, (2015)Admissibility of Electronic Evidence in Criminal Proceedings: An Outline of the South African Legal Position.. J. Inf. Law Technol., (2009)Law Enforcement Access to Password Protected and/or Encrypted Mobile Data.. ARES, page 399-405. IEEE Computer Society, (2016)Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not?. ARES, page 367-373. IEEE Computer Society, (2015)