Log in
Log in
For authors, reviewers, editors and board members
Username
Remember me
Go
Forgotten?
Help
Sitemap
Home
For Authors
For Librarians
Orders
Inderscience
Online
News
International Journal of Electronic Security and Digital Forensics
Published issues
2013 Vol.5 No.3/4
International Journal of Electronic Security and Digital Forensics
2013 Vol.5 No.3/4
Pages
Title and author(s)
161-171
Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know
Oriola Sallavaci; Carlisle George
DOI
:
10.1504/IJESDF.2013.058645
172-177
Cryptanalysis of a key agreement protocol based on chaotic Hash
Debiao He; Muhammad Khurram Khan
DOI
:
10.1504/IJESDF.2013.058650
178-187
An enhanced Hill cipher approach for image encryption in steganography
B. Karthikeyan; Jagannathan Chakravarthy; V. Vaithiyanathan
DOI
:
10.1504/IJESDF.2013.058652
188-200
HTTP botnet detection using hidden semi-Markov model with SNMP MIB variables
G. Kirubavathi Venkatesh; V. Srihari; R. Veeramani; R.M. Karthikeyan; R. Anitha
DOI
:
10.1504/IJESDF.2013.058653
201-217
Secure k-NN query on encrypted cloud database without key-sharing
Youwen Zhu; Rui Xu; Tsuyoshi Takagi
DOI
:
10.1504/IJESDF.2013.058654
218-228
Intellectual property right protection of image data using DCT and spread spectrum-based watermarking
Harsh Vikram Singh; Suman Yadav; Anand Mohan
DOI
:
10.1504/IJESDF.2013.058655
229-240
The impact of the antivirus on the digital evidence
Mohammed I. Al-Saleh
DOI
:
10.1504/IJESDF.2013.058656
241-256
Wavelet-transform steganography: algorithm and hardware implementation
Bassam J. Mohd; Thaier Hayajneh; Ahmad Nahar Quttoum
DOI
:
10.1504/IJESDF.2013.058657
257-269
Lattice-based message recovery signature schemes
Miaomiao Tian; Liusheng Huang
DOI
:
10.1504/IJESDF.2013.058658
270-287
On the reliability of forensic schemes using resampling for image copy-move forgery
Xiaobing Kang; Guangfeng Lin; Erhu Zhang; Yajun Chen
DOI
:
10.1504/IJESDF.2013.058665
288-296
On the security of an authentication scheme for multi-server architecture
Debiao He; Jianhua Chen; Wenbo Shi; Muhammad Khurram Khan
DOI
:
10.1504/IJESDF.2013.058669
297-316
Self-synchronising image steganography algorithms based on error-correcting codes
S.K. Muttoo; Sushil Kumar
DOI
:
10.1504/IJESDF.2013.058670
Sign up for new issue alerts
Subscribe/buy articles/issues
View sample articles
Latest issue contents as RSS feed
Forthcoming articles
Journal information in easy print format (PDF)
Publishing with Inderscience: ethical statement
Recommend to a librarian (PDF)
Feedback to Editor
Get permission to reproduce content
Find related journals
Keep up-to-date
Our Blog
Follow us on Twitter
Visit us on Facebook
Our Newsletter
(
subscribe for free
)
RSS Feeds
New issue alerts
Return to top