© 2011

Forensics in Telecommunications, Information, and Multimedia

Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

  • Xuejia Lai
  • Dawu Gu
  • Bo Jin
  • Yongquan Wang
  • Hui Li


  • Up-to-date results

  • Fast-track conference proceedings

  • State-of-the-art research

Conference proceedings e-Forensics 2010

Table of contents

  1. Front Matter
  2. Xiaodong Lin, Chenxi Zhang, Theodora Dule
    Pages 1-13
  3. Xudong Zhu, Hui Li, Zhijing Liu
    Pages 14-27
  4. Hwei-Ming Ying, Vrizlynn L. L. Thing
    Pages 28-39
  5. Zhenxing Lei, Theodora Dule, Xiaodong Lin
    Pages 53-65
  6. Xiaodong Lin, Rongxing Lu, Kevin Foxton, Xuemin (Sherman) Shen
    Pages 66-78
  7. Marti Ksionsk, Ping Ji, Weifeng Chen
    Pages 79-89
  8. Lianhai Wang, Lijuan Xu, Shuhui Zhang
    Pages 90-98
  9. Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng
    Pages 99-109
  10. Zheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun
    Pages 110-121
  11. Can Mo, Hui Li, Hui Zhu
    Pages 131-140
  12. Xinyan Zha, Sartaj Sahni
    Pages 141-158
  13. Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou
    Pages 159-167
  14. Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo
    Pages 168-178
  15. Kan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen
    Pages 179-184
  16. Yasha Chen, Jun Hu, Xinmao Gai, Yu Sun
    Pages 185-192
  17. JunKai Yi, Shuo Tang, Hui Li
    Pages 193-199

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.


data integrity data security digital forensics digital surveillance digital watermarking e-forensics network security

Editors and affiliations

  • Xuejia Lai
    • 1
  • Dawu Gu
    • 1
  • Bo Jin
    • 2
  • Yongquan Wang
    • 3
  • Hui Li
    • 4
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiP.R. China
  2. 2.The 3rd Research Institute of Ministry of Public SecurityShangahiP.R. China
  3. 3.East China University of Political Science and LawShanghaiChina
  4. 4.Xidian UniversityXianP.R. China

Bibliographic information

Industry Sectors
IT & Software
Consumer Packaged Goods
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences