Journal cover image

Browse issues

Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Electronic Security and Digital Forensics

2014 Vol. 6 No. 4


PagesTitle and authors
241-267A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol
Ioannis Psaroudakis; Vasilios Katos; Panagiotis Saragiotis; Lilian Mitrou
DOI: 10.1504/IJESDF.2014.065737

268-284Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised
A. Jegatheesan; D. Manimegalai
DOI: 10.1504/IJESDF.2014.065738

285-305Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine
Amit Kumar Singh; Mayank Dave; Anand Mohan
DOI: 10.1504/IJESDF.2014.065739

306-318Vietnamese privacy concerns and security in using online social networks
Narumon Sriratanaviriyakul; Mathews Nkhoma; Anna Lyza Felipe; Thanh Kim Cao; Quyen Ha Tran
DOI: 10.1504/IJESDF.2014.065740

319-332A secure and timestamp-based communication scheme for cloud environment
Abu Salim; Sachin Tripathi; Rajesh Kumar Tiwari
DOI: 10.1504/IJESDF.2014.065741

333-342A new identity-based ring signcryption scheme
Lunzhi Deng; Jiwen Zeng; Siwei Li
DOI: 10.1504/IJESDF.2014.065736