default search action
International Journal of Electronic Security and Digital Forensics, Volume 4
Volume 4, Number 1, 2012
- Rajesh Kumar Tiwari:
High capacity and secured methodologies for steganography. 1-18 - Alireza Jolfaei, Ahmadreza Vizandan, Abdolrasoul Mirghadri:
Image encryption using HC-128 and HC-256 stream ciphers. 19-42 - Debiao He, Yin Huang:
Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment. 43-53 - Joanne Kuzma:
Children and geotagged images: quantitative analysis for security risk assessment. 54-64 - S. Maria Celestin Vigila, K. Muneeswaran:
Key generation based on elliptic curve over finite prime field. 65-81 - Laavanya Sridhar, V. Lakshmi Prabha:
RF authenticated protection scheme for SRAM-based FPGA IP cores. 82-100
Volume 4, Numbers 2/3, 2012
- Gustavo Gonzalez Granadillo, Yosra Ben Mustapha, Nabil Hachem, Hervé Debar:
An ontology-driven approach to model SIEM information and operations using the SWRL formalism. 104-123 - Theodoros Ntouskas, Dimitrios Papanikas, Nineta Polemi:
Trusted collaborative services for the IT security management of SMEs/mEs. 124-137 - Anastasia Mavridou, Victor Zhou, Jerald Dawkins, Mauricio Papa:
A situational awareness framework for securing the smart grid using monitoring sensors and threat models. 138-153 - Stavroula Karayianni, Vasilios Katos, Christos K. Georgiadis:
A framework for password harvesting from volatile memory. 154-163 - Theodosios Tsiakis, Panagiotis Katsaros, Dimitris Gritzalis:
Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services. 164-177 - Bobby L. Tait:
Applied Fletcher-Munson curve algorithm for improved voice recognition. 178-186 - Vítor J. Sá, Daniela Borges, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos:
Biometric technologies and their perception by the common citizen. 187-200 - Marcelo Damasceno, Jerffeson Teixeira, Gustavo A. L. de Campos:
A prediction model for criminal levels using socio-criminal data. 201-214
Volume 4, Number 4, 2012
- Hoda Jannati, Abolfazl Falahati:
Security enhanced user authentication scheme for wireless sensor network. 215-228 - Georgia Koukiou, Vassilis Anastassopoulos:
Drunk person identification using thermal infrared images. 229-243 - Debiao He, Jianhua Chen:
Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing. 244-251 - Yichen Wang, Qiong Pu, Shuhua Wu:
Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service. 252-260 - Rabiu Mukhtar, Ameer Al-Nemrat, Mamoun Alazab, Sitalakshmi Venkatraman, Hamid Jahankhani:
Analysis of firewall log-based detection scenarios for evidence in digital forensics. 261-279 - T. N. Shankar, Gadadhar Sahoo, S. Niranjan:
Steganographic manipulations with elliptic curve cryptography. 280-297
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.