Follow
Thomas Martin
Title
Cited by
Cited by
Year
Secure network architecture
L He, B Littlefair, T Martin, D Kallath, C Rutherford
US Patent 8,544,081, 2013
1692013
Forensics data acquisition methods for mobile phones
KA Alghafli, A Jones, TA Martin
2012 International Conference for Internet Technology and Secured …, 2012
352012
Forensic analysis of the Windows 7 registry
KA Alghafli, A Jones, TA Martin
School of Computer and Information Science, Edith Cowan University, Perth …, 2010
352010
CISRI: A crime investigation system using the relative importance of information spreaders in networks depicting criminals communications
M Alzaabi, K Taha, TA Martin
IEEE Transactions on Information Forensics and Security 10 (10), 2196-2211, 2015
312015
An ontology-based forensic analysis tool
M Alzaabi, A Jones, TA Martin
242013
Experimental proof: Data remanence in cloud vms
B Albelooshi, K Salah, T Martin, E Damiani
2015 IEEE 8th International Conference on Cloud Computing, 1017-1020, 2015
232015
Assessing the security of the cloud environment
E Al Awadhi, K Salah, T Martin
2013 7th IEEE GCC Conference and Exhibition (GCC), 251-256, 2013
202013
Securing cryptographic keys in the cloud: A survey
B AlBelooshi, E Damiani, K Salah, T Martin
IEEE Cloud Computing 3 (4), 42-56, 2016
182016
Guidelines for the digital forensic processing of smartphones
KA Alghafli, A Jones, TA Martin
secau Security Research Centre, Edith Cowan University, Perth, Western Australia, 2011
182011
Method and apparatus for the creation of a self-authenticating document
J Duffell, L O'toole, T Martin
US Patent 7,757,091, 2010
162010
The 2012 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE
A Jones, T Martin, M Alzaabi
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012
15*2012
Counter-radicalisation policy and the securing of British identity: The politics of Prevent
T Martin
Counter-radicalisation policy and the securing of British identity, 2019
132019
An evaluation of data erasing tools
T Martin, A Jones
secau Security Research Centre, Edith Cowan University, Perth, Western Australia, 2011
132011
Digital forensics and the issues of identity
A Jones, T Martin
Information security technical report 15 (2), 67-71, 2010
132010
Securing cryptographic keys in the IaaS cloud model
B AlBelooshi, K Salah, T Martin, E Damiani
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
102015
Identification and recovery of video fragments for forensics file carving
K Alghafli, T Martin
2016 11th International Conference for Internet Technology and Secured …, 2016
92016
The use of ontologies in forensic analysis of smartphone content
M Alzaabi, TA Martin, K Taha, A Jones
Journal of Digital Forensics, Security and Law 10 (4), 9, 2015
92015
Establishing the broadcast efficiency of the subset difference revocation scheme
T Martin, KM Martin, P Wild
Designs, Codes and Cryptography 51, 315-334, 2009
92009
Ensuring anonymity for LBSs in smartphone environment
M Alzaabi, CY Yeun, TA Martin
Journal of Information Processing Systems 7 (1), 121-136, 2011
72011
Linear and differential properties of randomly generated des-like substitution boxes
Y AlSalami, T Martin, C Yeun
Computer Science and its Applications: Ubiquitous Information Technologies …, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20