


default search action
International Journal of Electronic Security and Digital Forensics, Volume 4
Volume 4, Number 1, 2012
- Rajesh Kumar Tiwari

:
High capacity and secured methodologies for steganography. 1-18 - Alireza Jolfaei

, Ahmadreza Vizandan, Abdolrasoul Mirghadri:
Image encryption using HC-128 and HC-256 stream ciphers. 19-42 - Debiao He, Yin Huang:

Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment. 43-53 - Joanne Kuzma:

Children and geotagged images: quantitative analysis for security risk assessment. 54-64 - S. Maria Celestin Vigila

, K. Muneeswaran:
Key generation based on elliptic curve over finite prime field. 65-81 - Laavanya Sridhar, V. Lakshmi Prabha:

RF authenticated protection scheme for SRAM-based FPGA IP cores. 82-100
Volume 4, Numbers 2/3, 2012
- Gustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar

:
An ontology-driven approach to model SIEM information and operations using the SWRL formalism. 104-123 - Theodoros Ntouskas, Dimitrios Papanikas, Nineta Polemi:

Trusted collaborative services for the IT security management of SMEs/mEs. 124-137 - Anastasia Mavridou, Victor Zhou, Jerald Dawkins, Mauricio Papa

:
A situational awareness framework for securing the smart grid using monitoring sensors and threat models. 138-153 - Stavroula Karayianni, Vasilios Katos

, Christos K. Georgiadis
:
A framework for password harvesting from volatile memory. 154-163 - Theodosios Tsiakis

, Panagiotis Katsaros, Dimitris Gritzalis:
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services. 164-177 - Bobby L. Tait

:
Applied Fletcher-Munson curve algorithm for improved voice recognition. 178-186 - Vítor J. Sá

, Daniela Borges, Sérgio Tenreiro de Magalhães
, Henrique M. Dinis Santos
:
Biometric technologies and their perception by the common citizen. 187-200 - Marcelo Damasceno, Jerffeson Teixeira, Gustavo A. L. de Campos:

A prediction model for criminal levels using socio-criminal data. 201-214
Volume 4, Number 4, 2012
- Hoda Jannati, Abolfazl Falahati

:
Security enhanced user authentication scheme for wireless sensor network. 215-228 - Georgia Koukiou

, Vassilis Anastassopoulos:
Drunk person identification using thermal infrared images. 229-243 - Debiao He, Jianhua Chen:

Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing. 244-251 - Yichen Wang, Qiong Pu, Shuhua Wu:

Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service. 252-260 - Rabiu Mukhtar, Ameer Al-Nemrat, Mamoun Alazab

, Sitalakshmi Venkatraman, Hamid Jahankhani:
Analysis of firewall log-based detection scenarios for evidence in digital forensics. 261-279 - T. N. Shankar, Gadadhar Sahoo

, S. Niranjan:
Steganographic manipulations with elliptic curve cryptography. 280-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














