2007

EC2ND 2006

Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK

ISBN: 978-1-84628-749-7 (Print) 978-1-84628-750-3 (Online)

Table of contents (12 chapters)

  1. Front Matter

    Pages i-vii

  2. Computer Network Defence

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-12

      Efficient Sampling of the Structure of Crypto Generators’ State Transition Graphs

    3. No Access

      Book Chapter

      Pages 13-22

      Mandatory Access Control applications to web hosting

    4. No Access

      Book Chapter

      Pages 23-32

      Outsourcing Security Services for Low Performance Portable Devices

    5. No Access

      Book Chapter

      Pages 33-42

      Public Verifiable Multi-sender Identity Based Threshold Signcryption

    6. No Access

      Book Chapter

      Pages 43-52

      A Discussion on the Role of Deception in Information Operations for the Defence of Computer Networks

    7. No Access

      Book Chapter

      Pages 53-60

      A New Approach to Understanding Information Assurance

    8. No Access

      Book Chapter

      Pages 61-66

      Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

  3. Digital Forensics & Incident Analysis

    1. Front Matter

      Pages 67-67

    2. No Access

      Book Chapter

      Pages 69-84

      Review of Forensic Tools for Smartphones

    3. No Access

      Book Chapter

      Pages 85-94

      Oscar — Using Byte Pairs to Find File Type and Camera Make of Data Fragments

    4. No Access

      Book Chapter

      Pages 95-103

      An empirical methodology derived from the analysis of information remaining on second hand hard disks

    5. No Access

      Book Chapter

      Pages 105-114

      Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    6. No Access

      Book Chapter

      Pages 115-125

      Professionalism in Computer Forensics