International Journal of Electronic Security and Digital Forensics (IJESDF)

International Journal of Electronic Security and Digital Forensics

2008 Vol.1 No.4


Pages Title and author(s)
323-335Vision-based technique for secure recognition of voice-less commands
Wai Chee Yau, Dinesh Kant Kumar, Hans Weghorn
DOI: 10.1504/IJESDF.2008.021450
336-343A meta-process for information security risk management
Katerina Papadaki, Despina Polemi
DOI: 10.1504/IJESDF.2008.021451
344-352Algebraic analysis of Trivium and Trivium/128
Mehreen Afzal, Ashraf Masood
DOI: 10.1504/IJESDF.2008.021452
353-361Tracking online trails
Man Qi, Denis Edgar-Nevill, Yongquan Wang, Rongsheng Xu
DOI: 10.1504/IJESDF.2008.021453
362-373A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch
Yi Dai, Jin-Shu Su, Ying Zhang
DOI: 10.1504/IJESDF.2008.021454
374-386Varieties of smartcard fraud
Susan Burns, George R.S. Weir
DOI: 10.1504/IJESDF.2008.021455
387-400Multisensor message exchange mechanism
Cyril Onwubiko
DOI: 10.1504/IJESDF.2008.021456
401-412Security issues in m-government
Manish Kumar, M. Hanumanthappa, Bhavanam Lakshma Reddy
DOI: 10.1504/IJESDF.2008.021457
413-422Another security improvement over the Lin et al.'s electronic-voting scheme
Maryam Rajabzadeh Asaar, Javad Mohajeri, Mahmoud Salmasizadeh
DOI: 10.1504/IJESDF.2008.021458
423-429Tools protecting stakeholders against hackers and crackers: an insight review
Hossein Jahankani, Branko Antonijevic, Terry H. Walcott
DOI: 10.1504/IJESDF.2008.021459