{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T10:37:26Z","timestamp":1751020646696,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/ic3.2013.6612225","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T14:38:09Z","timestamp":1380638289000},"page":"387-392","source":"Crossref","is-referenced-by-count":9,"title":["Privacy preserving efficient digital forensic investigation framework"],"prefix":"10.1109","author":[{"given":"Anuradha","family":"Gupta","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"key":"15","article-title":"Economic impact of identity theft in india: Lessons from western countries","volume":"12","author":"arunachalam","year":"2011","journal-title":"Preceding 3rd International Conference on Information and Financial Engi-neering IPEDR"},{"key":"16","article-title":"Identity theft: Trends and issues. A congressional research service report for congress","volume":"14","author":"finklea","year":"2012","journal-title":"Statistics and Computing"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"key":"11","article-title":"Protecting digital data privacy in computer forensic examination","author":"yiu","year":"0","journal-title":"Technical Report"},{"key":"12","article-title":"Privacy preserving condential forensic investigation for shared or remote server","author":"yiu","year":"2011","journal-title":"Preceding Conference Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing"},{"key":"3","article-title":"Richard iii vassil roussev bluepipe: A scalable architecture for on-The-spot digital forensics","volume":"3","author":"gao","year":"2004","journal-title":"The Proceding International Journal of Digital Evidence Summer"},{"key":"2","article-title":"Vassil roussev","author":"golden iii","year":"0","journal-title":"Digital Forensics Tools The next Generation"},{"journal-title":"A Report of the International High Tech Crime Investigation Association","year":"2011","author":"monkhouse","key":"1"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.4018\/jitsa.2011070102","article-title":"Minimizing collateral damage: Privacy preserving investigative data acquisition platform","author":"kwecka","year":"2011","journal-title":"Preceding 12th International Journal of Information Technologies and Systems Approach"},{"key":"7","article-title":"Case-based reasoning in live forensics","volume":"34","author":"ralha hoelz c","year":"0","journal-title":"Preceedings of the International Federation for Information Processing International Con-ference on Digital ForensicsOrlando"},{"journal-title":"Case-Relevance Information Investigation Bind-ing Computer Intelligence to the Current Computer Forensic Framework","year":"0","author":"yun ruibin c","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.9790\/3021-0203392398"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.15"},{"key":"9","article-title":"Visual analysis for textual relationships in digital forensics evidence","author":"wilson","year":"2009","journal-title":"Preceding Information Visualization Special Issue on VizSec"},{"key":"8","article-title":"A visual analytic framework for exploring relationships in textual contents of digital forensics evidence","volume":"22","author":"stamps","year":"0","journal-title":"Proceedings of Workshop on Visualization for Cyber Security"}],"event":{"name":"2013 Sixth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2013,8,8]]},"location":"Noida, India","end":{"date-parts":[[2013,8,10]]}},"container-title":["2013 Sixth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595807\/6612154\/06612225.pdf?arnumber=6612225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:55:29Z","timestamp":1498071329000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6612225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ic3.2013.6612225","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}