Login
Help
Sitemap
Home
For Authors
For Librarians
Orders
Inderscience
Online
News
International Journal of Electronic Security and Digital Forensics
Published issues
2013 Vol.5 No.3/4
International Journal of Electronic Security and Digital Forensics
2013 Vol.5 No.3/4
Pages
Title and author(s)
161-171
Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know
Oriola Sallavaci; Carlisle George
DOI
:
10.1504/IJESDF.2013.058645
172-177
Cryptanalysis of a key agreement protocol based on chaotic Hash
Debiao He; Muhammad Khurram Khan
DOI
:
10.1504/IJESDF.2013.058650
178-187
An enhanced Hill cipher approach for image encryption in steganography
B. Karthikeyan; Jagannathan Chakravarthy; V. Vaithiyanathan
DOI
:
10.1504/IJESDF.2013.058652
188-200
HTTP botnet detection using hidden semi-Markov model with SNMP MIB variables
G. Kirubavathi Venkatesh; V. Srihari; R. Veeramani; R.M. Karthikeyan; R. Anitha
DOI
:
10.1504/IJESDF.2013.058653
201-217
Secure k-NN query on encrypted cloud database without key-sharing
Youwen Zhu; Rui Xu; Tsuyoshi Takagi
DOI
:
10.1504/IJESDF.2013.058654
218-228
Intellectual property right protection of image data using DCT and spread spectrum-based watermarking
Harsh Vikram Singh; Suman Yadav; Anand Mohan
DOI
:
10.1504/IJESDF.2013.058655
229-240
The impact of the antivirus on the digital evidence
Mohammed I. Al-Saleh
DOI
:
10.1504/IJESDF.2013.058656
241-256
Wavelet-transform steganography: algorithm and hardware implementation
Bassam J. Mohd; Thaier Hayajneh; Ahmad Nahar Quttoum
DOI
:
10.1504/IJESDF.2013.058657
257-269
Lattice-based message recovery signature schemes
Miaomiao Tian; Liusheng Huang
DOI
:
10.1504/IJESDF.2013.058658
270-287
On the reliability of forensic schemes using resampling for image copy-move forgery
Xiaobing Kang; Guangfeng Lin; Erhu Zhang; Yajun Chen
DOI
:
10.1504/IJESDF.2013.058665
288-296
On the security of an authentication scheme for multi-server architecture
Debiao He; Jianhua Chen; Wenbo Shi; Muhammad Khurram Khan
DOI
:
10.1504/IJESDF.2013.058669
297-316
Self-synchronising image steganography algorithms based on error-correcting codes
S.K. Muttoo; Sushil Kumar
DOI
:
10.1504/IJESDF.2013.058670
Sign up for new issue alerts
Subscribe/buy articles/issues
View sample articles
Copyright and author entitlement
Forthcoming articles
Journal information in easy print format (PDF)
Publishing with Inderscience: ethical statement
Recommend to a librarian (PDF)
Feedback to Editor
Get permission to reproduce content
Find related journals
Keep up-to-date
Our Blog
Follow us on Twitter
Visit us on Facebook
Our Newsletter
(
subscribe for free
)
RSS Feeds
New issue alerts
Inderscience is a member of publishing organisations including:
Return to top