International Journal of Electronic Security and Digital Forensics
2012 Vol.4 No.4
Pages | Title and author(s) |
215-228 | Security enhanced user authentication scheme for wireless sensor networkHoda Jannati; Abolfazl Falahati DOI: 10.1504/IJESDF.2012.049735 |
229-243 | Drunk person identification using thermal infrared imagesGeorgia Koukiou; Vassilis Anastassopoulos DOI: 10.1504/IJESDF.2012.049747 |
244-251 | Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairingDebiao He; Jianhua Chen DOI: 10.1504/IJESDF.2012.049754 |
252-260 | Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service Yichen Wang; Qiong Pu; Shuhua Wu DOI: 10.1504/IJESDF.2012.049755 |
261-279 | Analysis of firewall log-based detection scenarios for evidence in digital forensicsRabiu Mukhtar; A. Al-Nemrat; Mamoun Alazab; Sitalakshmi Venkatraman; Hamid Jahankhani DOI: 10.1504/IJESDF.2012.049761 |
280-297 | Steganographic manipulations with elliptic curve cryptographyT.N. Shankar; G. Sahoo; S. Niranjan DOI: 10.1504/IJESDF.2012.049762 |