International Journal of Electronic Security and Digital Forensics
2015 Vol.7 No.1
Pages | Title and author(s) |
1-19 | Efficient scalar product protocol and its privacy-preserving applicationYouwen Zhu; Tsuyoshi Takagi DOI: 10.1504/IJESDF.2015.067985 |
20-29 | Steganographic detection in image using the reduction of support vectorsBouguerne Imen; Tlili Yamina DOI: 10.1504/IJESDF.2015.067986 |
30-40 | Robust symmetric cryptography using plain-text variant session keyHari Narayan Khan; Ayan Chaudhuri; Souvik Kar; Parijat Roy; Atal Chaudhuri DOI: 10.1504/IJESDF.2015.067990 |
41-53 | Random linear network coding with probabilistic polynomial-time wiretap adversaryZhiwen Hu; Li Zhu; Huaqing Mao DOI: 10.1504/IJESDF.2015.067993 |
54-75 | Certificate-based encoding of gate level description for secure transmissionSandip Ghosal; Debasis Mitra; Subhasis Bhattacharjee DOI: 10.1504/IJESDF.2015.067994 |
76-104 | A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detectionJonathan Goh; Vrizlynn L.L. Thing DOI: 10.1504/IJESDF.2015.067996 |