


default search action
International Journal of Electronic Security and Digital Forensics, Volume 5
Volume 5, Number 1, 2013
- Miaomiao Tian, Liusheng Huang, Wei Yang:

Efficient hierarchical identity-based signatures from lattices. 1-10 - S. Maria Celestin Vigila

, K. Muneeswaran:
A new elliptic curve cryptosystem for securing sensitive data applications. 11-24 - Mahsa Shakeri, Mansour Jamzad:

A robust zero-watermarking scheme using Canny edge detector. 25-44 - Laavanya Sridhar, V. Lakshmi Prabha:

RF authenticated reconfiguration-based access control protection scheme for SRAM-based FPGA IP cores. 45-66 - Oriola Sallavaci, Carlisle Eldwidge George:

New admissibility regime for expert evidence: the likely impact on digital forensics. 67-79
Volume 5, Number 2, 2013
- Richard E. Overill:

The 'inverse CSI effect': further evidence from e-crime data. 81-89 - Mamoun Alazab

, Sitalakshmi Venkatraman:
Detecting malicious behaviour using supervised learning algorithms of the function calls. 90-109 - G. Mary Amirtha Sagayee, S. Arumugam, G. S. Anandha Mala:

Biometric encryption using enhanced finger print image and elliptic curve. 110-123 - Zeki Turedi, Liangxiu Han

:
Automatic forensic log file analysis for Mac OS X systems. 124-138 - Simone Cecchini, Diane Gan:

SQL injection attacks with the AMPA suite. 139-160
Volume 5, Numbers 3/4, 2013
- Oriola Sallavaci, Carlisle Eldwidge George:

Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know. 161-171 - Debiao He, Muhammad Khurram Khan

:
Cryptanalysis of a key agreement protocol based on chaotic Hash. 172-177 - Karthikeyan Balasubramanian

, Jagannathan Chakravarthy, V. Vaithiyanathan:
An enhanced Hill cipher approach for image encryption in steganography. 178-187 - G. Kirubavathi Venkatesh

, V. Srihari, R. Veeramani, R. Karthikeyan, R. Anitha Nadarajan:
HTTP botnet detection using hidden semi-Markov model with SNMP MIB variables. 188-200 - Youwen Zhu, Rui Xu, Tsuyoshi Takagi:

Secure k-NN query on encrypted cloud database without key-sharing. 201-217 - Harsh Vikram Singh

, Suman Yadav, Anand Mohan:
Intellectual property right protection of image data using DCT and spread spectrum-based watermarking. 218-228 - Mohammed I. Al-Saleh:

The impact of the antivirus on the digital evidence. 229-240 - Bassam Jamil Mohd, Thaier Hayajneh

, Ahmad Nahar Quttoum
:
Wavelet-transform steganography: algorithm and hardware implementation. 241-256 - Miaomiao Tian, Liusheng Huang:

Lattice-based message recovery signature schemes. 257-269 - XiaoBing Kang, Guangfeng Lin

, Erhu Zhang, Yajun Chen:
On the reliability of forensic schemes using resampling for image copy-move forgery. 270-287 - Debiao He, Jianhua Chen, Wenbo Shi, Muhammad Khurram Khan

:
On the security of an authentication scheme for multi-server architecture. 288-296 - Sunil Kumar Muttoo, Sushil Kumar:

Self-synchronising image steganography algorithms based on error-correcting codes. 297-316

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














