Advertisement

Forensics in Telecommunications, Information, and Multimedia

Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

  • Xuejia Lai
  • Dawu Gu
  • Bo Jin
  • Yongquan Wang
  • Hui Li
Conference proceedings e-Forensics 2010

Table of contents

  1. Front Matter
  2. Xiaodong Lin, Chenxi Zhang, Theodora Dule
    Pages 1-13
  3. Xudong Zhu, Hui Li, Zhijing Liu
    Pages 14-27
  4. Hwei-Ming Ying, Vrizlynn L. L. Thing
    Pages 28-39
  5. Zhenxing Lei, Theodora Dule, Xiaodong Lin
    Pages 53-65
  6. Xiaodong Lin, Rongxing Lu, Kevin Foxton, Xuemin (Sherman) Shen
    Pages 66-78
  7. Marti Ksionsk, Ping Ji, Weifeng Chen
    Pages 79-89
  8. Lianhai Wang, Lijuan Xu, Shuhui Zhang
    Pages 90-98
  9. Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng
    Pages 99-109
  10. Zheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun
    Pages 110-121
  11. Can Mo, Hui Li, Hui Zhu
    Pages 131-140
  12. Xinyan Zha, Sartaj Sahni
    Pages 141-158
  13. Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou
    Pages 159-167
  14. Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo
    Pages 168-178
  15. Kan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen
    Pages 179-184
  16. Yasha Chen, Jun Hu, Xinmao Gai, Yu Sun
    Pages 185-192
  17. JunKai Yi, Shuo Tang, Hui Li
    Pages 193-199
  18. Hong Guo, Bo Jin, Daoli Huang
    Pages 224-233
  19. Wenlei He, Gongshen Liu, Jun Luo, Jiuchuan Lin
    Pages 234-240
  20. Ning Ding, Dawu Gu, Zhiqiang Liu
    Pages 241-255
  21. Przemysław Błaśkiewicz, Przemysław Kubiak, Mirosław Kutyłowski
    Pages 256-270
  22. Aidong Xu, Yan Gong, Yongquan Wang, Nayan Ai
    Pages 277-281
  23. Hao Peng, Songnian Lu, Jianhua Li, Aixin Zhang, Dandan Zhao
    Pages 287-293
  24. Lei Gong, Yong Zhao, Jianhua Liao
    Pages 294-300
  25. Liping Ding, Jian Gu, Yongji Wang, Jingzheng Wu
    Pages 301-311
  26. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.

Keywords

data integrity data security digital forensics digital surveillance digital watermarking e-forensics network security

Editors and affiliations

  • Xuejia Lai
    • 1
  • Dawu Gu
    • 1
  • Bo Jin
    • 2
  • Yongquan Wang
    • 3
  • Hui Li
    • 4
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiP.R. China
  2. 2.The 3rd Research Institute of Ministry of Public SecurityShangahiP.R. China
  3. 3.East China University of Political Science and LawShanghaiChina
  4. 4.Xidian UniversityXianP.R. China

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-23602-0
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-23601-3
  • Online ISBN 978-3-642-23602-0
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering