Author of the publication

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.

, , , , and . FGCN (2), page 141-145. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watershed segmentation with boundary curvature ratio based merging criterion., , , , , , and . SIP, page 7-12. IASTED/ACTA Press, (2007)Towards a Better Similarity Measure for Keyword Profiling via Clustering., , , , , and . COMPSAC Workshops, page 16-20. IEEE Computer Society, (2013)Risk Management of Corporate Confidential Information in Digital Form., , , , , , and . COMPSAC, page 88-89. IEEE Computer Society, (2004)Improving Disk Sector Integrity Using 3-dimension Hashing Scheme., , , , and . FGCN (2), page 141-145. IEEE Computer Society, (2007)Consistency Issue on Live Systems Forensics., , , and . FGCN (2), page 136-140. IEEE Computer Society, (2007)Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , and 11 other author(s). IEEE Journal on Selected Areas in Communications, 24 (10): 1889-1900 (2006)Forward-secure multisignature and blind signature schemes., , , and . Applied Mathematics and Computation, 168 (2): 895-908 (2005)A Secure Modified ID-Based Undeniable Signature Scheme., , , and . IACR Cryptology ePrint Archive, (2003)Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity., , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 352-369. Springer, (2003)Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)., , and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 11-19. Springer, (2007)