Browse issues Vol. 10 2018 Vol. 10 No. 2 2018 Vol. 10 No. 1 Vol. 9 2017 Vol. 9 No. 4 2017 Vol. 9 No. 3 2017 Vol. 9 No. 2 2017 Vol. 9 No. 1 Vol. 8 2016 Vol. 8 No. 4 2016 Vol. 8 No. 3 2016 Vol. 8 No. 2 2016 Vol. 8 No. 1 Vol. 7 2015 Vol. 7 No. 4 2015 Vol. 7 No. 3 2015 Vol. 7 No. 2 2015 Vol. 7 No. 1 Vol. 6 2014 Vol. 6 No. 4 2014 Vol. 6 No. 3 2014 Vol. 6 No. 2 2014 Vol. 6 No. 1 Vol. 5 2013 Vol. 5 No. 3/4 2013 Vol. 5 No. 2 2013 Vol. 5 No. 1 Vol. 4 2012 Vol. 4 No. 4 2012 Vol. 4 No. 2/3 2012 Vol. 4 No. 1 Vol. 3 2010 Vol. 3 No. 4 2010 Vol. 3 No. 3 2010 Vol. 3 No. 2 2010 Vol. 3 No. 1 Vol. 2 2009 Vol. 2 No. 4 2009 Vol. 2 No. 3 2009 Vol. 2 No. 2 2009 Vol. 2 No. 1 Vol. 1 2008 Vol. 1 No. 4 2008 Vol. 1 No. 3 2007 Vol. 1 No. 2 2007 Vol. 1 No. 1 International Journal of Electronic Security and Digital Forensics2010 Vol. 3 No. 1 PagesTitle and authors1-26A new spread spectrum watermarking method using two levels DCTAmir Hossein Taherinia, Mansour Jamzad DOI: 10.1504/IJESDF.2010.03232827-40A new methodology for data coding and embedding for high-capacity transmittingRajesh Kumar Tiwari, G. SahooDOI: 10.1504/IJESDF.2010.03232941-59Improved wireless security for GMSK-based devices using RF fingerprintingDonald R. Reising, Michael A. Temple, Michael J. MendenhallDOI: 10.1504/IJESDF.2010.03233060-72Assessment of advanced cryptographic antiviral techniquesAthanasios Karantjias, Nineta PolemiDOI: 10.1504/IJESDF.2010.03233173-81Balancing the threat of personal technology in the workplaceSean Garrity, George R.S. WeirDOI: 10.1504/IJESDF.2010.03233282-94Parsing ambiguities in authentication and key establishment protocolsLiqun Chen, Chris J. MitchellDOI: 10.1504/IJESDF.2010.032333