default search action
International Journal of Electronic Security and Digital Forensics, Volume 10
Volume 10, Number 1, 2018
- Lakshmi Naga Divya Tamma, Shaik Shakeel Ahamad:
A novel chaotic hash-based attribute-based encryption and decryption on cloud computing. 1-19 - Xiaojun Zhang, Chunxiang Xu, Jingting Xue:
Efficient multi-receiver identity-based signcryption from lattice assumption. 20-38 - Sajjad Shokouhyar, Farhad Panahifar, Azadeh Karimisefat, Maryam Nezafatbakhsh:
An information system risk assessment model: a case study in online banking system. 39-60 - Allah Ditta, Yongquan Cai, Muhammad Azeem, Khurram Gulzar Rana, Haiyang Yu, Muhammad Qasim Memon:
Information hiding: Arabic text steganography by using Unicode characters to hide secret data. 61-78 - Hongcai Xu, Xiaobing Kang, Yihan Wang, Yilan Wang:
Exploring robust and blind watermarking approach of colour images in DWT-DCT-SVD domain for copyright protection. 79-96 - Zhihai Zhuo:
Novel image watermarking method based on FRWT and SVD. 97-107
Volume 10, Number 2, 2018
- Ram Chandra Barik, Sitanshu Sekhar Sahu, Suvamoy Changder:
A novel smooth texture-based visual cryptography approach for secure communication. 109-137 - Mustafa Irshad, Haider M. Al-Khateeb, Ali Mansour, Moses Ashawa, Muhammad Hamisu:
Effective methods to detect metamorphic malware: a systematic review. 138-154 - Nedal Tahat, Eddie Shahril Ismail:
Improvement of signature scheme based on factoring and chaotic maps. 155-167 - Chunhua Jin, Jianyang Zhao:
Certificateless aggregate deniable authentication protocol for ad hoc networks. 168-187 - Yunyun Qu, Quanwu Mu:
An efficient certificateless aggregate signature without pairing. 188-203
Volume 10, Number 3, 2018
- Abdelwadood Mesleh:
Black hole attack evaluation for AODV and AOMDV routing protocols. 207-227 - Omar Suleiman Arabeyyat:
Information security model using decision tree for Jordanian public sector. 228-241 - Julian Droogan, Lise Waldek:
Should we be afraid of cyber-terrorism? 242-254 - MingJian Tang, Mamoun Alazab, Yuxiu Luo, Matthew Donlon:
Disclosure of cyber security vulnerabilities: time series modelling. 255-275 - Mohammad Muneer Kallash, Jonathan Loo, Aboubaker Lasebae, Mahdi Aiash:
A security framework for node-to-node communications based on the LISP architecture. 276-291 - Jingsong Cui, Hang Tu:
Secure and efficient authentication scheme for access control in mobile pay-TV systems. 292-310 - Mohammed A. Nasrullah:
LSB based audio steganography preserving minimum sample SNR. 311-321
Volume 10, Number 4, 2018
- Chunhong Jiao, Xinyin Xiang:
Attribute-based encryption supporting data filtration over post-quantum assumptions. 323-337 - Mukesh Dalal, Mamta Juneja:
Video steganalysis to obstruct criminal activities for digital forensics: a survey. 338-355 - Ryan M. Gabet, Kathryn C. Seigfried-Spellar, Marcus K. Rogers:
A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers. 356-371 - Raj Kamal Kapur, Sunil Kumar Khatri, Lalit M. Patnaik:
Optimised elliptic curve digital signature on NIST compliant curves for authentication of MANET nodes. 372-387 - L. Mancy, S. Maria Celestin Vigila:
A new diffusion and substitution based cryptosystem for securing medical image applications. 388-400 - Surbhi Gupta, Neeraj Mohan, Parvinder Singh Sandhu:
Energy deviation measure: a technique for digital image forensics. 401-416 - Xiaojuan Chen, Huiwen Deng:
A new scheme of preserving user privacy for location-based service. 417-433
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.