Journal cover image

Browse issues


Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2012 Vol. 4 No. 4

 

PagesTitle and authors
215-228Security enhanced user authentication scheme for wireless sensor network
Hoda Jannati; Abolfazl Falahati
DOI: 10.1504/IJESDF.2012.049735

229-243Drunk person identification using thermal infrared images
Georgia Koukiou; Vassilis Anastassopoulos
DOI: 10.1504/IJESDF.2012.049747

244-251Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing
Debiao He; Jianhua Chen
DOI: 10.1504/IJESDF.2012.049754

252-260Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service
Yichen Wang; Qiong Pu; Shuhua Wu
DOI: 10.1504/IJESDF.2012.049755

261-279Analysis of firewall log-based detection scenarios for evidence in digital forensics
Rabiu Mukhtar; A. Al-Nemrat; Mamoun Alazab; Sitalakshmi Venkatraman; Hamid Jahankhani
DOI: 10.1504/IJESDF.2012.049761

280-297Steganographic manipulations with elliptic curve cryptography
T.N. Shankar; G. Sahoo; S. Niranjan
DOI: 10.1504/IJESDF.2012.049762