Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2009 Vol. 2 No. 3


PagesTitle and authors
239-252Web services security evaluation considerations
Elias Pimenidis, Christos K. Georgiadis
DOI: 10.1504/IJESDF.2009.027520

253-268A pragmatic approach to temporary payment card numbers
David J. Boyd
DOI: 10.1504/IJESDF.2009.027521

269-279BioVault: biometrically based encryption
B.L. Tait, S.H. Von Solms
DOI: 10.1504/IJESDF.2009.027522

280-305A robust spread spectrum watermarking method using two levels DCT
Amir Hossein Taherinia, Mansour Jamzad
DOI: 10.1504/IJESDF.2009.027523

306-321Challenges and complexities of managing information security
Cyril Onwubiko, Andrew P. Lenaghan
DOI: 10.1504/IJESDF.2009.027524

322-333A Swedish IT forensics course – expert opinions
Alan Davidson, Rein Oja, Louise Yngstrom
DOI: 10.1504/IJESDF.2009.027525