Journal cover image

Browse issues


Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2008 Vol. 1 No. 4

 

PagesTitle and authors
323-335Vision-based technique for secure recognition of voice-less commands
Wai Chee Yau, Dinesh Kant Kumar, Hans Weghorn
DOI: 10.1504/IJESDF.2008.021450

336-343A meta-process for information security risk management
Katerina Papadaki, Despina Polemi
DOI: 10.1504/IJESDF.2008.021451

344-352Algebraic analysis of Trivium and Trivium/128
Mehreen Afzal, Ashraf Masood
DOI: 10.1504/IJESDF.2008.021452

353-361Tracking online trails
Man Qi, Denis Edgar-Nevill, Yongquan Wang, Rongsheng Xu
DOI: 10.1504/IJESDF.2008.021453

362-373A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch
Yi Dai, Jin-Shu Su, Ying Zhang
DOI: 10.1504/IJESDF.2008.021454

374-386Varieties of smartcard fraud
Susan Burns, George R.S. Weir
DOI: 10.1504/IJESDF.2008.021455

387-400Multisensor message exchange mechanism
Cyril Onwubiko
DOI: 10.1504/IJESDF.2008.021456

401-412Security issues in m-government
Manish Kumar, M. Hanumanthappa, Bhavanam Lakshma Reddy
DOI: 10.1504/IJESDF.2008.021457

413-422Another security improvement over the Lin et al.'s electronic-voting scheme
Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh
DOI: 10.1504/IJESDF.2008.021458

423-429Tools protecting stakeholders against hackers and crackers: an insight review
Hossein Jahankani, Branko Antonijevic, Terry H. Walcott
DOI: 10.1504/IJESDF.2008.021459