Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital droplets: Microsoft SkyDrive forensic data remnants., and . Future Generation Comp. Syst., 29 (6): 1378-1394 (2013)The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols., , and . Computer Communications, 29 (15): 2788-2797 (2006)A survey of information security incident handling in the cloud., and . Computers & Security, (2015)Dropbox analysis: Data remnants on user machines., and . Digital Investigation, 10 (1): 3-18 (2013)Cloud storage forensics: ownCloud as a case study., and . Digital Investigation, 10 (4): 287-299 (2013)Complementing Computational Protocol Analysis with Formal Specifications., , , and . Formal Aspects in Security and Trust, volume 173 of IFIP, page 129-144. Springer, (2004)Building the Next Generation of Cyber Security Professionals., and . ECIS, (2014)Data Recovery from Proprietary Formatted Cctv Hard Disks., , and . IFIP Int. Conf. Digital Forensics, volume 410 of IFIP Advances in Information and Communication Technology, page 213-223. Springer, (2013)Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept., and . TrustCom, page 935-942. IEEE Computer Society, (2014)Cloud Attack and Risk Assessment Taxonomy., and . IEEE Cloud Computing, 2 (1): 14-20 (2015)