
International Journal of Electronic Security and Digital Forensics
2010 Vol.3 No.1
Pages | Title and author(s) |
1-26 | A new spread spectrum watermarking method using two levels DCTAmir Hossein Taherinia, Mansour Jamzad DOI: 10.1504/IJESDF.2010.032328 |
27-40 | A new methodology for data coding and embedding for high-capacity transmittingRajesh Kumar Tiwari, G. Sahoo DOI: 10.1504/IJESDF.2010.032329 |
41-59 | Improved wireless security for GMSK-based devices using RF fingerprintingDonald R. Reising, Michael A. Temple, Michael J. Mendenhall DOI: 10.1504/IJESDF.2010.032330 |
60-72 | Assessment of advanced cryptographic antiviral techniquesAthanasios Karantjias, Nineta Polemi DOI: 10.1504/IJESDF.2010.032331 |
73-81 | Balancing the threat of personal technology in the workplaceSean Garrity, George R.S. Weir DOI: 10.1504/IJESDF.2010.032332 |
82-94 | Parsing ambiguities in authentication and key establishment protocolsLiqun Chen, Chris J. Mitchell DOI: 10.1504/IJESDF.2010.032333 |