International Journal of Electronic Security and Digital Forensics
2009 Vol.2 No.3
Pages | Title and author(s) |
239-252 | Web services security evaluation considerationsElias Pimenidis, Christos K. Georgiadis DOI: 10.1504/IJESDF.2009.027520 |
253-268 | A pragmatic approach to temporary payment card numbersDavid J. Boyd DOI: 10.1504/IJESDF.2009.027521 |
269-279 | BioVault: biometrically based encryptionB.L. Tait, S.H. Von Solms DOI: 10.1504/IJESDF.2009.027522 |
280-305 | A robust spread spectrum watermarking method using two levels DCTAmir Hossein Taherinia, Mansour Jamzad DOI: 10.1504/IJESDF.2009.027523 |
306-321 | Challenges and complexities of managing information securityCyril Onwubiko, Andrew P. Lenaghan DOI: 10.1504/IJESDF.2009.027524 |
322-333 | A Swedish IT forensics course – expert opinionsAlan Davidson, Rein Oja, Louise Yngstrom DOI: 10.1504/IJESDF.2009.027525 |