


default search action
International Journal of Electronic Security and Digital Forensics, Volume 8
Volume 8, Number 1, 2016
- Mohammed I. Al-Saleh

, Bilal Shebaro:
Enhancing malware detection: clients deserve more protection. 1-16 - Ou Ruan, Jing Zhou, Mingwu Zhang:

An efficient resource-fair commit-prove-fair-open protocol. 17-34 - P. Mohan Kumar, J. Arokia Renjith:

An image steganographic algorithm on smart mechanism of embedding secret data in images. 35-52 - Anum Javeed Zargar, Amit Kumar Singh

:
Robust and imperceptible image watermarking in DWT-BTC domain. 53-62 - Arashdeep Kaur

, Malay Kishore Dutta
, Krishan Mohan Soni, Nidhi Taneja:
Hiding biometric features in audio signals using Gram-Schmidt orthogonalisation. 63-81 - Xiaojun Zhang, Chunxiang Xu, Chunhua Jin:

Enabling identity-based cloud storage public auditing with quantum computers resistance. 82-98
Volume 8, Number 2, 2016
- Cassandra Flowers, Ali Mansour, Haider M. Al-Khateeb

:
Web browser artefacts in private and portable modes: a forensic investigation. 99-117 - S. Saravanakumar, R. Deepa

:
Concatenated and interleaving codes for MC DS CDMA using Cadence virtuoso. 118-130 - S. Hemalatha

, U. Dinesh Acharya
, A. Renuka
:
Audio data hiding technique using integer wavelet transform. 131-147 - Yunyun Qu, Lunzhi Deng, Xiaomin Bao, Huawei Huang:

An efficient certificateless multi-proxy signature scheme without pairing. 148-163 - Bassam Jamil Mohd, Thaier Hayajneh

, Zaid Abu Khalaf, Athanasios V. Vasilakos
:
A comparative study of steganography designs based on multiple FPGA platforms. 164-190
Volume 8, Number 3, 2016
- Kanchan Hans, Laxmi Ahuja, Sunil Kumar Muttoo:

A fuzzy logic approach for detecting redirection spam. 191-204 - Reza Montasari

:
An ad hoc detailed review of digital forensic investigation process models. 205-223 - Shujun Dong, Xingan Li

:
Besieged privacy in social networking services. 224-233 - Xiaojuan Chen, Yi Mu, Xiaofen Wang, Runhua Shi:

Privacy-enhanced distance computation with applications. 234-249 - Yun Tao:

An authentication scheme for multi-server environments based on chaotic maps. 250-261 - Lamri Laouamer, Muath AlShaikh

, Laurent Nana, Anca Christine Pascu:
Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images. 262-284
Volume 8, Number 4, 2016
- Reza Montasari

:
A comprehensive digital forensic investigation process model. 285-302 - Yeluripati Govindha Ramaiah, VijayaKumari Gunta:

A new fully homomorphic encryption over the integers using smaller public key. 303-331 - Run Xie, Chunxiang Xu, Chanlian He, Xiaojun Zhang:

A new group signature scheme for dynamic membership. 332-351 - Min Wu, Jianhua Chen, Wenxia Zhu, Zhenyang Yuan:

Security analysis and enhancements of a multi-factor biometric authentication scheme. 352-365 - Anushikha Singh, Malay Kishore Dutta

, Namrata Raghuvanshi:
Digital tags from multi-subject biometric features for joint ownership of digital data. 366-391 - Abhilasha Singh

, Malay Kishore Dutta
:
Wavelet-based reversible watermarking system for integrity control and authentication in tele-ophthalmological applications. 392-411

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














