Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2014 Vol. 6 No. 2

Systems Security, Safety and Sustainability


PagesTitle and authors
81-89Thresholding attack on the BSS-based cryptosystem which has binary key
Ali Sadr; Raziyeh Sadat Okhovat
DOI: 10.1504/IJESDF.2014.063087

90-103Identity-based threshold ring signcryption from pairing
Lunzhi Deng; Siwei Li; Yafeng Yu
DOI: 10.1504/IJESDF.2014.063093

104-114Vulnerability considerations for power line communication's supervisory control and data acquisition
Ali Hosseinpournajarkolaei; Hamid Jahankhani; Amin Hosseinian-Far
DOI: 10.1504/IJESDF.2014.063108

115-129Vehicular ad hoc network applications and security: a study into the economic and the legal implications
Patrice Seuwou; Dilip Patel; George Ubakanma
DOI: 10.1504/IJESDF.2014.063107

130-139A security enhanced password authentication and update scheme based on elliptic curve cryptography
Pengshuai Qiao; Hang Tu
DOI: 10.1504/IJESDF.2014.063109

140-146Multi-carrier coded division multiple access multiplexing against multi-path fading
Haider D. Albonda; Sufian Yousef
DOI: 10.1504/IJESDF.2014.063111

147-156The biometric landscape - towards a sustainable biometric terminology framework
Bobby L. Tait
DOI: 10.1504/IJESDF.2014.063110