International Journal of Electronic Security and Digital Forensics
2016 Vol.8 No.2
Pages | Title and author(s) |
99-117 | Web browser artefacts in private and portable modes: a forensic investigationCassandra Flowers; Ali Mansour; Haider M. Al-Khateeb DOI: 10.1504/IJESDF.2016.075583 |
118-130 | Concatenated and interleaving codes for MC DS CDMA using Cadence virtuosoS. Saravanakumar; R. Deepa DOI: 10.1504/IJESDF.2016.075585 |
131-147 | Audio data hiding technique using integer wavelet transformS. Hemalatha; U. Dinesh Acharya; A. Renuka DOI: 10.1504/IJESDF.2016.075586 |
148-163 | An efficient certificateless multi-proxy signature scheme without pairingYunyun Qu; Lunzhi Deng; Xiaomin Bao; Huawei Huang DOI: 10.1504/IJESDF.2016.075588 |
164-190 | A comparative study of steganography designs based on multiple FPGA platformsBassam J. Mohd; Thaier Hayajneh; Zaid Abu Khalaf; Athanasios V. Vasilakos DOI: 10.1504/IJESDF.2016.075589 |