International Journal of Electronic Security and Digital Forensics
2016 Vol.8 No.1
Pages | Title and author(s) |
1-16 | Enhancing malware detection: clients deserve more protectionMohammed I. Al-Saleh; Bilal Shebaro DOI: 10.1504/IJESDF.2016.073728 |
17-34 | An efficient resource-fair commit-prove-fair-open protocolOu Ruan; Jing Zhou; Mingwu Zhang DOI: 10.1504/IJESDF.2016.073729 |
35-52 | An image steganographic algorithm on smart mechanism of embedding secret data in images P. Mohan Kumar; J. Arokia Renjith DOI: 10.1504/IJESDF.2016.073732 |
53-62 | Robust and imperceptible image watermarking in DWT-BTC domainAnum Javeed Zargar; Amit Kumar Singh DOI: 10.1504/IJESDF.2016.073734 |
63-81 | Hiding biometric features in audio signals using Gram-Schmidt orthogonalisationArashdeep Kaur; Malay Kishore Dutta; K.M. Soni; Nidhi Taneja DOI: 10.1504/IJESDF.2016.073735 |
82-98 | Enabling identity-based cloud storage public auditing with quantum computers resistanceXiaojun Zhang; Chunxiang Xu; Chunhua Jin DOI: 10.1504/IJESDF.2016.073736 |