International Journal of Electronic Security and Digital Forensics
2012 Vol.4 No.1
Pages | Title and author(s) |
1-18 | High capacity and secured methodologies for steganographyRajesh Kumar Tiwari DOI: 10.1504/IJESDF.2012.045387 |
19-42 | Image encryption using HC-128 and HC-256 stream ciphersAlireza Jolfaei; Ahmadreza Vizandan; Abdolrasoul Mirghadri DOI: 10.1504/IJESDF.2012.045388 |
43-53 | Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environmentDebiao He; Yin Huang DOI: 10.1504/IJESDF.2012.045389 |
54-64 | Children and geotagged images: quantitative analysis for security risk assessmentJoanne M. Kuzma DOI: 10.1504/IJESDF.2012.045390 |
65-81 | Key generation based on elliptic curve over finite prime fieldS. Maria Celestin Vigila; K. Muneeswaran DOI: 10.1504/IJESDF.2012.045391 |
82-100 | RF authenticated protection scheme for SRAM-based FPGA IP coresSridhar Laavanya; V. Lakshmi Prabha DOI: 10.1504/IJESDF.2012.045392 |