


default search action
International Journal of Electronic Security and Digital Forensics, Volume 3
Volume 3, Number 1, 2010
- Amirhossein Taherinia

, Mansour Jamzad:
A new spread spectrum watermarking method using two levels DCT. 1-26 - Rajesh Kumar Tiwari

, Gadadhar Sahoo
:
A new methodology for data coding and embedding for high-capacity transmitting. 27-40 - Donald R. Reising, Michael A. Temple, Michael J. Mendenhall:

Improved wireless security for GMSK-based devices using RF fingerprinting. 41-59 - Athanasios Karantjias, Nineta Polemi:

Assessment of advanced cryptographic antiviral techniques. 60-72 - Sean Garrity, George R. S. Weir:

Balancing the threat of personal technology in the workplace. 73-81 - Liqun Chen

, Chris J. Mitchell
:
Parsing ambiguities in authentication and key establishment protocols. 82-94
Volume 3, Number 2, 2010
- Joanne Kuzma, Colin B. Price, Richard N. Henson:

Flash vulnerabilities analysis of US educational websites. 95-107 - Sundresan Perumal

, Norita Md Norwawi:
Integrated computer forensic investigation model based on Malaysian standards. 108-119 - Gadadhar Sahoo

, Rajesh Kumar Tiwari
:
Some new methodologies for secured data coding and transmission. 120-137 - Raymond Wu, Masayuki Hisada:

Static and dynamic analysis for web security in industry applications. 138-150 - Sérgio Tenreiro de Magalhães

, Henrique M. Dinis Santos
, Leonel Duarte Dos Santos, Hamid Jahankhani:
Cyberwar and the Russian Federation: the usual suspect. 151-163 - Fawzy Ibrahim, M. Zaki:

Design and implementation of a block-based lossless watermarking scheme. 164-185
Volume 3, Number 3, 2010
- Filipe Caldeira

, Edmundo Monteiro
, Paulo Simões
:
Trust and reputation management for critical infrastructure protection. 187-203 - Christos K. Georgiadis

, Elias Pimenidis, Ioannis Kokkinidis:
A coloured Petri net analysis of the Transaction Internet Protocol. 204-222 - George R. S. Weir, Michael Morran:

Hiding the hidden message: approaches to textual steganography. 223-233 - José Miguel Pimenta:

The new strategic concept of NATO: the Portuguese role. 234-239 - Abdullah Abdali Rashed, Henrique M. Dinis Santos

:
User acceptance OTM machine: in the Arab culture. 240-248 - Tapio Saarelainen, Jorma Jormakka:

Interfacing collaboration and command tools for crises management military command and control systems. 249-264 - Teresa Susana Mendes Pereira

, Henrique M. Dinis Santos
:
An audit framework to support information system security management. 265-277 - Tiago Martins, Sérgio Tenreiro de Magalhães

:
Baby crying acceptance in Portugal. 278-287
Volume 3, Number 4, 2010
- Abdelrahman Desoky:

Headstega: e-mail-headers-based steganography methodology. 289-310 - Sunil Kumar Muttoo, Vinay Kumar:

Hamiltonian graph approach to steganography. 311-332 - P. Karthigaikumar

, K. Baskaran
:
Hardware implementation of invisible image watermarking algorithm using secured binary image authentication technique. 333-354 - Debiao He, Jianhua Chen, Rui Zhang:

Weaknesses of a dynamic ID-based remote user authentication scheme. 355-362 - Malay Kishore Dutta

:
Perceptible watermarking: a promising application. 363-375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














