


default search action
International Journal of Electronic Security and Digital Forensics, Volume 6
Volume 6, Number 1, 2014
- Ben Brewster

, Babak Akhgar, Andrew Staniforth, David Waddington, Simon Andrews, Sarah Johnson Mitchell, Kayleigh Johnson:
Towards a model for the integration of knowledge management in law enforcement agencies. 1-17 - Vítor J. Sá

, Sérgio Tenreiro de Magalhães
, Henrique M. Dinis Santos
:
Enrolment time as a requirement for biometric fingerprint recognition. 18-24 - M. Dolores Ruiz

, María J. Martín-Bautista
, Daniel Sánchez
, María Amparo Vila Miranda
, Miguel Delgado:
Anomaly detection using fuzzy association rules. 25-37 - Ikechukwu Nwobodo, Hossein Jahankhani, Aloysius Edoh:

Security challenges in the distributed cloud computing. 38-51 - Bobby L. Tait

:
Secure cloud-based biometric authentication utilising smart devices for electronic transactions. 52-61 - Brad Wardman, Jason Britt, Gary Warner:

New tackle to catch a phisher. 62-80
Volume 6, Number 2, 2014
- Ali Sadr

, Raziyeh Sadat Okhovat:
Thresholding attack on the BSS-based cryptosystem which has binary key. 81-89 - Lunzhi Deng, Siwei Li, Yafeng Yu:

Identity-based threshold ring signcryption from pairing. 90-103 - Ali Hosseinpour Najarkolaei, Hamid Jahankhani, Amin Hosseinian Far

:
Vulnerability considerations for power line communication's supervisory control and data acquisition. 104-114 - Patrice Seuwou

, Dilip Patel, George Ubakanma:
Vehicular ad hoc network applications and security: a study into the economic and the legal implications. 115-129 - Pengshuai Qiao, Hang Tu:

A security enhanced password authentication and update scheme based on elliptic curve cryptography. 130-139 - Haider Daami R. Albonda, Sufian Yousef:

Multi-carrier coded division multiple access multiplexing against multi-path fading. 140-146 - Bobby L. Tait

:
The biometric landscape - towards a sustainable biometric terminology framework. 147-156
Volume 6, Number 3, 2014
- Yun Zhao, Chunming Zhang:

Cryptanalysis and improvement of an authentication scheme for telecare medical information systems. 157-168 - Sina Pournouri, Matthew J. Craven

:
E-business, recent threats and security countermeasures. 169-184 - Eman Alashwali:

Incorporating hacking projects in computer and information security education: an empirical study. 185-203 - Miaomiao Tian, Liusheng Huang, Wei Yang:

Practical certificateless short signature scheme. 204-218 - Sushil Kumar

, Sunil Kumar Muttoo:
Robust and secure image steganographic algorithm based on matrix embedding. 219-240
Volume 6, Number 4, 2014
- Ioannis Psaroudakis, Vasilios Katos

, Panagiotis Saragiotis, Lilian Mitrou:
A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol. 241-267 - A. Jegatheesan, D. Manimegalai:

Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised. 268-284 - Amit Kumar Singh

, Mayank Dave
, Anand Mohan:
Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. 285-305 - Abu Salim, Sachin Tripathi, Rajesh Kumar Tiwari

:
A secure and timestamp-based communication scheme for cloud environment. 319-332 - Lunzhi Deng, Jiwen Zeng, Siwei Li:

A new identity-based ring signcryption scheme. 333-342

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














