A survey of privacy issues in digital forensics, International Journal of Cyber- Security and Digital Forensics, vol.1, issue.4, pp.311-323, 2012. ,
An efficient technique for enhancing forensic capabilities of the Ext2 filesystem, Digital Investigation, pp.55-61, 2007. ,
Sequenced release of privacy-accurate information in a forensic investigation, Digital Investigation, pp.95-101, 2010. ,
DOI : 10.1016/j.diin.2010.01.002
Privacy-respecting digital investigation, 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp.129-138, 2014. ,
DOI : 10.1109/PST.2014.6890932
Research and Review on Computer Forensics, Forensics in Telecommunications, Information and Multimedia, pp.224-233, 2011. ,
DOI : 10.1145/1368506.1368521
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation, Proceedings of the International Conference on Information and Communication Technology, pp.312-317, 2013. ,
DOI : 10.1007/978-3-642-36818-9_33
URL : https://hal.archives-ouvertes.fr/hal-01480187
Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.378-383, 2011. ,
DOI : 10.1109/IIHMSP.2011.28
Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics, 2011 Third International Conference on Multimedia Information Networking and Security, pp.595-599, 2011. ,
DOI : 10.1109/MINES.2011.90
Application of secret sharing techniques in confidential forensic investigations, Proceedings of the Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensics, pp.69-76, 2013. ,
Protecting Digital Data Privacy in Computer Forensic Examination, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011. ,
DOI : 10.1109/SADFE.2011.15
Defining Privacy, Journal of Social Philosophy, vol.39, issue.3, pp.411-428, 2008. ,
DOI : 10.1111/j.1467-9833.2008.00433.x
Survey of cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis, Proceedings of the Sixth Annual Conference on Digital Forensics, Security and Law, pp.55-69, 2011. ,
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results, Digital Investigation, pp.34-43, 2013. ,
DOI : 10.1016/j.diin.2013.02.004
? Implementation, challenges and the role of adjudicating officers, Proceedings of the National Seminar on Enforcement of Cyberlaw, 2000. ,
Privacy-preserving network flow recording, Digital Investigation, pp.90-100, 2011. ,
DOI : 10.1016/j.diin.2011.05.011
Protecting third party privacy in digital forensic investigations, in Advances in Digital Forensics IX, pp.19-31, 2013. ,
Preserving Dates and Timestamps for Incident Handling in Android Smartphones, Advances in Digital Forensics X, pp.209-225, 2014. ,
DOI : 10.1007/978-3-662-44952-3_14
URL : https://hal.archives-ouvertes.fr/hal-01393772