default search action
International Journal of Electronic Security and Digital Forensics, Volume 8
Volume 8, Number 1, 2016
- Mohammed I. Al-Saleh, Bilal Shebaro:
Enhancing malware detection: clients deserve more protection. 1-16 - Ou Ruan, Jing Zhou, Mingwu Zhang:
An efficient resource-fair commit-prove-fair-open protocol. 17-34 - P. Mohan Kumar, J. Arokia Renjith:
An image steganographic algorithm on smart mechanism of embedding secret data in images. 35-52 - Anum Javeed Zargar, Amit Kumar Singh:
Robust and imperceptible image watermarking in DWT-BTC domain. 53-62 - Arashdeep Kaur, Malay Kishore Dutta, Krishan Mohan Soni, Nidhi Taneja:
Hiding biometric features in audio signals using Gram-Schmidt orthogonalisation. 63-81 - Xiaojun Zhang, Chunxiang Xu, Chunhua Jin:
Enabling identity-based cloud storage public auditing with quantum computers resistance. 82-98
Volume 8, Number 2, 2016
- Cassandra Flowers, Ali Mansour, Haider M. Al-Khateeb:
Web browser artefacts in private and portable modes: a forensic investigation. 99-117 - S. Saravanakumar, R. Deepa:
Concatenated and interleaving codes for MC DS CDMA using Cadence virtuoso. 118-130 - S. Hemalatha, U. Dinesh Acharya, A. Renuka:
Audio data hiding technique using integer wavelet transform. 131-147 - Yunyun Qu, Lunzhi Deng, Xiaomin Bao, Huawei Huang:
An efficient certificateless multi-proxy signature scheme without pairing. 148-163 - Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Athanasios V. Vasilakos:
A comparative study of steganography designs based on multiple FPGA platforms. 164-190
Volume 8, Number 3, 2016
- Kanchan Hans, Laxmi Ahuja, Sunil Kumar Muttoo:
A fuzzy logic approach for detecting redirection spam. 191-204 - Reza Montasari:
An ad hoc detailed review of digital forensic investigation process models. 205-223 - Shujun Dong, Xingan Li:
Besieged privacy in social networking services. 224-233 - Xiaojuan Chen, Yi Mu, Xiaofen Wang, Runhua Shi:
Privacy-enhanced distance computation with applications. 234-249 - Yun Tao:
An authentication scheme for multi-server environments based on chaotic maps. 250-261 - Lamri Laouamer, Muath AlShaikh, Laurent Nana, Anca Christine Pascu:
Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical images. 262-284
Volume 8, Number 4, 2016
- Reza Montasari:
A comprehensive digital forensic investigation process model. 285-302 - Yeluripati Govindha Ramaiah, VijayaKumari Gunta:
A new fully homomorphic encryption over the integers using smaller public key. 303-331 - Run Xie, Chunxiang Xu, Chanlian He, Xiaojun Zhang:
A new group signature scheme for dynamic membership. 332-351 - Min Wu, Jianhua Chen, Wenxia Zhu, Zhenyang Yuan:
Security analysis and enhancements of a multi-factor biometric authentication scheme. 352-365 - Anushikha Singh, Malay Kishore Dutta, Namrata Raghuvanshi:
Digital tags from multi-subject biometric features for joint ownership of digital data. 366-391 - Abhilasha Singh, Malay Kishore Dutta:
Wavelet-based reversible watermarking system for integrity control and authentication in tele-ophthalmological applications. 392-411
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.