Legacy systems are valuable assets for organisations. They continuously evolve with new emerged technologies in rapidly changing business environment. ICENI provided an excellent ...
In this paper we report the concept and initial prototype of a device that can be used to support evidence recovery at a crime scene. The key elements are radio frequency identifi...
Chris Baber, Paul Smith, James Cross, Damien Zasik...
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus indu...
In this paper, we present techniques to recover useful information from disk drives that are used to store user data. The main idea is to use a logging mechanism to record the mod...
With the technology advance and the growth of Internet, the information that can be found in this net, as well as the number of users that access to look for specific data is big...