
International Journal of Electronic Security and Digital Forensics
2009 Vol.2 No.3
| Pages | Title and author(s) |
| 239-252 | Web services security evaluation considerationsElias Pimenidis, Christos K. Georgiadis DOI: 10.1504/IJESDF.2009.027520 |
| 253-268 | A pragmatic approach to temporary payment card numbersDavid J. Boyd DOI: 10.1504/IJESDF.2009.027521 |
| 269-279 | BioVault: biometrically based encryptionB.L. Tait, S.H. Von Solms DOI: 10.1504/IJESDF.2009.027522 |
| 280-305 | A robust spread spectrum watermarking method using two levels DCTAmir Hossein Taherinia, Mansour Jamzad DOI: 10.1504/IJESDF.2009.027523 |
| 306-321 | Challenges and complexities of managing information securityCyril Onwubiko, Andrew P. Lenaghan DOI: 10.1504/IJESDF.2009.027524 |
| 322-333 | A Swedish IT forensics course – expert opinionsAlan Davidson, Rein Oja, Louise Yngstrom DOI: 10.1504/IJESDF.2009.027525 |