


default search action
International Journal of Electronic Security and Digital Forensics, Volume 10
Volume 10, Number 1, 2018
- Lakshmi Naga Divya Tamma, Shaik Shakeel Ahamad:

A novel chaotic hash-based attribute-based encryption and decryption on cloud computing. 1-19 - Xiaojun Zhang, Chunxiang Xu, Jingting Xue:

Efficient multi-receiver identity-based signcryption from lattice assumption. 20-38 - Sajjad Shokouhyar, Farhad Panahifar, Azadeh Karimisefat, Maryam Nezafatbakhsh:

An information system risk assessment model: a case study in online banking system. 39-60 - Allah Ditta, Yongquan Cai, Muhammad Azeem, Khurram Gulzar Rana, Haiyang Yu, Muhammad Qasim Memon:

Information hiding: Arabic text steganography by using Unicode characters to hide secret data. 61-78 - Hongcai Xu, Xiaobing Kang, Yihan Wang, Yilan Wang:

Exploring robust and blind watermarking approach of colour images in DWT-DCT-SVD domain for copyright protection. 79-96 - Zhihai Zhuo:

Novel image watermarking method based on FRWT and SVD. 97-107
Volume 10, Number 2, 2018
- Ram Chandra Barik, Sitanshu Sekhar Sahu, Suvamoy Changder:

A novel smooth texture-based visual cryptography approach for secure communication. 109-137 - Mustafa Irshad, Haider M. Al-Khateeb, Ali Mansour, Moses Ashawa, Muhammad Hamisu:

Effective methods to detect metamorphic malware: a systematic review. 138-154 - Nedal Tahat, Eddie Shahril Ismail:

Improvement of signature scheme based on factoring and chaotic maps. 155-167 - Chunhua Jin, Jianyang Zhao:

Certificateless aggregate deniable authentication protocol for ad hoc networks. 168-187 - Yunyun Qu, Quanwu Mu:

An efficient certificateless aggregate signature without pairing. 188-203
Volume 10, Number 3, 2018
- Abdelwadood Mesleh:

Black hole attack evaluation for AODV and AOMDV routing protocols. 207-227 - Omar Suleiman Arabeyyat:

Information security model using decision tree for Jordanian public sector. 228-241 - Julian Droogan, Lise Waldek:

Should we be afraid of cyber-terrorism? 242-254 - MingJian Tang, Mamoun Alazab, Yuxiu Luo, Matthew Donlon:

Disclosure of cyber security vulnerabilities: time series modelling. 255-275 - Mohammad Muneer Kallash, Jonathan Loo, Aboubaker Lasebae, Mahdi Aiash:

A security framework for node-to-node communications based on the LISP architecture. 276-291 - Jingsong Cui, Hang Tu:

Secure and efficient authentication scheme for access control in mobile pay-TV systems. 292-310 - Mohammed A. Nasrullah:

LSB based audio steganography preserving minimum sample SNR. 311-321
Volume 10, Number 4, 2018
- Chunhong Jiao, Xinyin Xiang:

Attribute-based encryption supporting data filtration over post-quantum assumptions. 323-337 - Mukesh Dalal

, Mamta Juneja
:
Video steganalysis to obstruct criminal activities for digital forensics: a survey. 338-355 - Ryan M. Gabet, Kathryn C. Seigfried-Spellar

, Marcus K. Rogers
:
A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers. 356-371 - Raj Kamal Kapur, Sunil Kumar Khatri

, Lalit M. Patnaik:
Optimised elliptic curve digital signature on NIST compliant curves for authentication of MANET nodes. 372-387 - L. Mancy, S. Maria Celestin Vigila

:
A new diffusion and substitution based cryptosystem for securing medical image applications. 388-400 - Surbhi Gupta

, Neeraj Mohan
, Parvinder Singh Sandhu:
Energy deviation measure: a technique for digital image forensics. 401-416 - Xiaojuan Chen, Huiwen Deng:

A new scheme of preserving user privacy for location-based service. 417-433

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














