2004 | ||
---|---|---|
6 | EE | Hank Wolfe: Penetrating encrypted evidence. Digital Investigation 1(2): 102-105 (2004) |
2003 | ||
5 | EE | Hank Wolfe: Evidence acquisition. Computers & Security 22(3): 193-195 (2003) |
4 | EE | Hank Wolfe: Evidence analysis. Computers & Security 22(4): 289-291 (2003) |
3 | EE | Hank Wolfe: Encountering encryption. Computers & Security 22(5): 388-391 (2003) |
2 | EE | Hank Wolfe: Forensic evidence testimony - some thoughts. Computers & Security 22(7): 577-579 (2003) |
1 | EE | Hank Wolfe: Setting up an electronic evidence forensics laboratory. Computers & Security 22(8): 670-672 (2003) |