
International Journal of Electronic Security and Digital Forensics
2013 Vol.5 No.1
Pages | Title and author(s) |
1-10 | Efficient hierarchical identity-based signatures from latticesMiaomiao Tian; Liusheng Huang; Wei Yang DOI: 10.1504/IJESDF.2013.054403 |
11-24 | A new elliptic curve cryptosystem for securing sensitive data applicationsS. Maria Celestin Vigila; K. Muneeswaran DOI: 10.1504/IJESDF.2013.054405 |
25-44 | A robust zero-watermarking scheme using Canny edge detectorMahsa Shakeri; Mansour Jamzad DOI: 10.1504/IJESDF.2013.054406 |
45-66 | RF authenticated reconfiguration-based access control protection scheme for SRAM-based FPGA IP coresLaavanya Sridhar; V. Lakshmi Prabha DOI: 10.1504/IJESDF.2013.054404 |
67-79 | New admissibility regime for expert evidence: the likely impact on digital forensicsOriola Sallavaci; Carlisle George DOI: 10.1504/IJESDF.2013.054420 |