Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2010 Vol. 3 No. 1


PagesTitle and authors
1-26A new spread spectrum watermarking method using two levels DCT
Amir Hossein Taherinia, Mansour Jamzad
DOI: 10.1504/IJESDF.2010.032328

27-40A new methodology for data coding and embedding for high-capacity transmitting
Rajesh Kumar Tiwari, G. Sahoo
DOI: 10.1504/IJESDF.2010.032329

41-59Improved wireless security for GMSK-based devices using RF fingerprinting
Donald R. Reising, Michael A. Temple, Michael J. Mendenhall
DOI: 10.1504/IJESDF.2010.032330

60-72Assessment of advanced cryptographic antiviral techniques
Athanasios Karantjias, Nineta Polemi
DOI: 10.1504/IJESDF.2010.032331

73-81Balancing the threat of personal technology in the workplace
Sean Garrity, George R.S. Weir
DOI: 10.1504/IJESDF.2010.032332

82-94Parsing ambiguities in authentication and key establishment protocols
Liqun Chen, Chris J. Mitchell
DOI: 10.1504/IJESDF.2010.032333