default search action
International Journal of Electronic Security and Digital Forensics, Volume 3
Volume 3, Number 1, 2010
- Amirhossein Taherinia, Mansour Jamzad:
A new spread spectrum watermarking method using two levels DCT. 1-26 - Rajesh Kumar Tiwari, Gadadhar Sahoo:
A new methodology for data coding and embedding for high-capacity transmitting. 27-40 - Donald R. Reising, Michael A. Temple, Michael J. Mendenhall:
Improved wireless security for GMSK-based devices using RF fingerprinting. 41-59 - Athanasios Karantjias, Nineta Polemi:
Assessment of advanced cryptographic antiviral techniques. 60-72 - Sean Garrity, George R. S. Weir:
Balancing the threat of personal technology in the workplace. 73-81 - Liqun Chen, Chris J. Mitchell:
Parsing ambiguities in authentication and key establishment protocols. 82-94
Volume 3, Number 2, 2010
- Joanne Kuzma, Colin B. Price, Richard N. Henson:
Flash vulnerabilities analysis of US educational websites. 95-107 - Sundresan Perumal, Norita Md Norwawi:
Integrated computer forensic investigation model based on Malaysian standards. 108-119 - Gadadhar Sahoo, Rajesh Kumar Tiwari:
Some new methodologies for secured data coding and transmission. 120-137 - Raymond Wu, Masayuki Hisada:
Static and dynamic analysis for web security in industry applications. 138-150 - Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos, Leonel Duarte Dos Santos, Hamid Jahankhani:
Cyberwar and the Russian Federation: the usual suspect. 151-163 - Fawzy Ibrahim, M. Zaki:
Design and implementation of a block-based lossless watermarking scheme. 164-185
Volume 3, Number 3, 2010
- Filipe Caldeira, Edmundo Monteiro, Paulo Simões:
Trust and reputation management for critical infrastructure protection. 187-203 - Christos K. Georgiadis, Elias Pimenidis, Ioannis Kokkinidis:
A coloured Petri net analysis of the Transaction Internet Protocol. 204-222 - George R. S. Weir, Michael Morran:
Hiding the hidden message: approaches to textual steganography. 223-233 - José Miguel Pimenta:
The new strategic concept of NATO: the Portuguese role. 234-239 - Abdullah Abdali Rashed, Henrique M. Dinis Santos:
User acceptance OTM machine: in the Arab culture. 240-248 - Tapio Saarelainen, Jorma Jormakka:
Interfacing collaboration and command tools for crises management military command and control systems. 249-264 - Teresa Susana Mendes Pereira, Henrique M. Dinis Santos:
An audit framework to support information system security management. 265-277 - Tiago Martins, Sérgio Tenreiro de Magalhães:
Baby crying acceptance in Portugal. 278-287
Volume 3, Number 4, 2010
- Abdelrahman Desoky:
Headstega: e-mail-headers-based steganography methodology. 289-310 - Sunil Kumar Muttoo, Vinay Kumar:
Hamiltonian graph approach to steganography. 311-332 - P. Karthigaikumar, K. Baskaran:
Hardware implementation of invisible image watermarking algorithm using secured binary image authentication technique. 333-354 - Debiao He, Jianhua Chen, Rui Zhang:
Weaknesses of a dynamic ID-based remote user authentication scheme. 355-362 - Malay Kishore Dutta:
Perceptible watermarking: a promising application. 363-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.