default search action
International Journal of Electronic Security and Digital Forensics, Volume 6
Volume 6, Number 1, 2014
- Ben Brewster, Babak Akhgar, Andrew Staniforth, David Waddington, Simon Andrews, Sarah Johnson Mitchell, Kayleigh Johnson:
Towards a model for the integration of knowledge management in law enforcement agencies. 1-17 - Vítor J. Sá, Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos:
Enrolment time as a requirement for biometric fingerprint recognition. 18-24 - M. Dolores Ruiz, María J. Martín-Bautista, Daniel Sánchez, María Amparo Vila Miranda, Miguel Delgado:
Anomaly detection using fuzzy association rules. 25-37 - Ikechukwu Nwobodo, Hossein Jahankhani, Aloysius Edoh:
Security challenges in the distributed cloud computing. 38-51 - Bobby L. Tait:
Secure cloud-based biometric authentication utilising smart devices for electronic transactions. 52-61 - Brad Wardman, Jason Britt, Gary Warner:
New tackle to catch a phisher. 62-80
Volume 6, Number 2, 2014
- Ali Sadr, Raziyeh Sadat Okhovat:
Thresholding attack on the BSS-based cryptosystem which has binary key. 81-89 - Lunzhi Deng, Siwei Li, Yafeng Yu:
Identity-based threshold ring signcryption from pairing. 90-103 - Ali Hosseinpour Najarkolaei, Hamid Jahankhani, Amin Hosseinian Far:
Vulnerability considerations for power line communication's supervisory control and data acquisition. 104-114 - Patrice Seuwou, Dilip Patel, George Ubakanma:
Vehicular ad hoc network applications and security: a study into the economic and the legal implications. 115-129 - Pengshuai Qiao, Hang Tu:
A security enhanced password authentication and update scheme based on elliptic curve cryptography. 130-139 - Haider Daami R. Albonda, Sufian Yousef:
Multi-carrier coded division multiple access multiplexing against multi-path fading. 140-146 - Bobby L. Tait:
The biometric landscape - towards a sustainable biometric terminology framework. 147-156
Volume 6, Number 3, 2014
- Yun Zhao, Chunming Zhang:
Cryptanalysis and improvement of an authentication scheme for telecare medical information systems. 157-168 - Sina Pournouri, Matthew J. Craven:
E-business, recent threats and security countermeasures. 169-184 - Eman Alashwali:
Incorporating hacking projects in computer and information security education: an empirical study. 185-203 - Miaomiao Tian, Liusheng Huang, Wei Yang:
Practical certificateless short signature scheme. 204-218 - Sushil Kumar, Sunil Kumar Muttoo:
Robust and secure image steganographic algorithm based on matrix embedding. 219-240
Volume 6, Number 4, 2014
- Ioannis Psaroudakis, Vasilios Katos, Panagiotis Saragiotis, Lilian Mitrou:
A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol. 241-267 - A. Jegatheesan, D. Manimegalai:
Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised. 268-284 - Amit Kumar Singh, Mayank Dave, Anand Mohan:
Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. 285-305 - Abu Salim, Sachin Tripathi, Rajesh Kumar Tiwari:
A secure and timestamp-based communication scheme for cloud environment. 319-332 - Lunzhi Deng, Jiwen Zeng, Siwei Li:
A new identity-based ring signcryption scheme. 333-342
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.