default search action
International Journal of Electronic Security and Digital Forensics, Volume 5
Volume 5, Number 1, 2013
- Miaomiao Tian, Liusheng Huang, Wei Yang:
Efficient hierarchical identity-based signatures from lattices. 1-10 - S. Maria Celestin Vigila, K. Muneeswaran:
A new elliptic curve cryptosystem for securing sensitive data applications. 11-24 - Mahsa Shakeri, Mansour Jamzad:
A robust zero-watermarking scheme using Canny edge detector. 25-44 - Laavanya Sridhar, V. Lakshmi Prabha:
RF authenticated reconfiguration-based access control protection scheme for SRAM-based FPGA IP cores. 45-66 - Oriola Sallavaci, Carlisle Eldwidge George:
New admissibility regime for expert evidence: the likely impact on digital forensics. 67-79
Volume 5, Number 2, 2013
- Richard E. Overill:
The 'inverse CSI effect': further evidence from e-crime data. 81-89 - Mamoun Alazab, Sitalakshmi Venkatraman:
Detecting malicious behaviour using supervised learning algorithms of the function calls. 90-109 - G. Mary Amirtha Sagayee, S. Arumugam, G. S. Anandha Mala:
Biometric encryption using enhanced finger print image and elliptic curve. 110-123 - Zeki Turedi, Liangxiu Han:
Automatic forensic log file analysis for Mac OS X systems. 124-138 - Simone Cecchini, Diane Gan:
SQL injection attacks with the AMPA suite. 139-160
Volume 5, Numbers 3/4, 2013
- Oriola Sallavaci, Carlisle Eldwidge George:
Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know. 161-171 - Debiao He, Muhammad Khurram Khan:
Cryptanalysis of a key agreement protocol based on chaotic Hash. 172-177 - Karthikeyan Balasubramanian, Jagannathan Chakravarthy, V. Vaithiyanathan:
An enhanced Hill cipher approach for image encryption in steganography. 178-187 - G. Kirubavathi Venkatesh, V. Srihari, R. Veeramani, R. Karthikeyan, R. Anitha Nadarajan:
HTTP botnet detection using hidden semi-Markov model with SNMP MIB variables. 188-200 - Youwen Zhu, Rui Xu, Tsuyoshi Takagi:
Secure k-NN query on encrypted cloud database without key-sharing. 201-217 - Harsh Vikram Singh, Suman Yadav, Anand Mohan:
Intellectual property right protection of image data using DCT and spread spectrum-based watermarking. 218-228 - Mohammed I. Al-Saleh:
The impact of the antivirus on the digital evidence. 229-240 - Bassam Jamil Mohd, Thaier Hayajneh, Ahmad Nahar Quttoum:
Wavelet-transform steganography: algorithm and hardware implementation. 241-256 - Miaomiao Tian, Liusheng Huang:
Lattice-based message recovery signature schemes. 257-269 - XiaoBing Kang, Guangfeng Lin, Erhu Zhang, Yajun Chen:
On the reliability of forensic schemes using resampling for image copy-move forgery. 270-287 - Debiao He, Jianhua Chen, Wenbo Shi, Muhammad Khurram Khan:
On the security of an authentication scheme for multi-server architecture. 288-296 - Sunil Kumar Muttoo, Sushil Kumar:
Self-synchronising image steganography algorithms based on error-correcting codes. 297-316
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.