Title :
Table of contents
Abstract :
The following topics are dealt with: cybercrime; trustworthy computing; authorship analysis; locality sensitive hash; malicious spam email developments; and authorship attribution.
Keywords :
authorisation; computer crime; cryptography; trusted computing; unsolicited e-mail; authorship analysis; authorship attribution; cybercrime; locality sensitive hash; malicious spam email developments; trustworthy computing;
Conference_Titel :
Cybercrime and Trustworthy Computing Workshop (CTC), 2013 Fourth
Conference_Location :
Sydney NSW
Print_ISBN :
978-1-4799-3075-3