A. Aminnezhad, A. Dehghantanha, and M. Abdullah, A survey of privacy issues in digital forensics, International Journal of Cyber- Security and Digital Forensics, vol.1, issue.4, pp.311-323, 2012.

M. Barik, G. Gupta, S. Sinha, A. Mishra, and C. Mazumdar, An efficient technique for enhancing forensic capabilities of the Ext2 filesystem, Digital Investigation, pp.55-61, 2007.

N. Croft and M. Olivier, Sequenced release of privacy-accurate information in a forensic investigation, Digital Investigation, pp.95-101, 2010.
DOI : 10.1016/j.diin.2010.01.002

A. Dehghantanha and K. Franke, Privacy-respecting digital investigation, 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp.129-138, 2014.
DOI : 10.1109/PST.2014.6890932

H. Guo, B. Jin, and D. Huang, Research and Review on Computer Forensics, Forensics in Telecommunications, Information and Multimedia, pp.224-233, 2011.
DOI : 10.1145/1368506.1368521

S. Hou, R. Sasaki, T. Uehara, and S. Yiu, Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation, Proceedings of the International Conference on Information and Communication Technology, pp.312-317, 2013.
DOI : 10.1007/978-3-642-36818-9_33

URL : https://hal.archives-ouvertes.fr/hal-01480187

S. Hou, T. Uehara, S. Yiu, L. Hui, and K. Chow, Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.378-383, 2011.
DOI : 10.1109/IIHMSP.2011.28

S. Hou, T. Uehara, S. Yiu, L. Hui, and K. Chow, Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics, 2011 Third International Conference on Multimedia Information Networking and Security, pp.595-599, 2011.
DOI : 10.1109/MINES.2011.90

S. Hou, S. Yiu, T. Uehara, and R. Sasaki, Application of secret sharing techniques in confidential forensic investigations, Proceedings of the Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensics, pp.69-76, 2013.

F. Law, P. Chan, S. Yiu, K. Chow, M. Kwan et al., Protecting Digital Data Privacy in Computer Forensic Examination, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011.
DOI : 10.1109/SADFE.2011.15

A. Moore, Defining Privacy, Journal of Social Philosophy, vol.39, issue.3, pp.411-428, 2008.
DOI : 10.1111/j.1467-9833.2008.00433.x

K. Ruan, J. Carthy, and T. Kechadi, Survey of cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis, Proceedings of the Sixth Annual Conference on Digital Forensics, Security and Law, pp.55-69, 2011.

K. Ruan, J. Carthy, T. Kechadi, and I. Baggili, Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results, Digital Investigation, pp.34-43, 2013.
DOI : 10.1016/j.diin.2013.02.004

K. Seth, ? Implementation, challenges and the role of adjudicating officers, Proceedings of the National Seminar on Enforcement of Cyberlaw, 2000.

B. Shebaro and J. Crandall, Privacy-preserving network flow recording, Digital Investigation, pp.90-100, 2011.
DOI : 10.1016/j.diin.2011.05.011

W. Van-staden, Protecting third party privacy in digital forensic investigations, in Advances in Digital Forensics IX, pp.19-31, 2013.

R. Verma, J. Govindaraj, and G. Gupta, Preserving Dates and Timestamps for Incident Handling in Android Smartphones, Advances in Digital Forensics X, pp.209-225, 2014.
DOI : 10.1007/978-3-662-44952-3_14

URL : https://hal.archives-ouvertes.fr/hal-01393772