International Journal of Electronic Security and Digital Forensics
2016 Vol.8 No.3
Pages | Title and author(s) |
191-204 | A fuzzy logic approach for detecting redirection spamKanchan Hans; Laxmi Ahuja; S.K. Muttoo DOI: 10.1504/IJESDF.2016.077435 |
205-223 | An ad hoc detailed review of digital forensic investigation process modelsReza Montasari DOI: 10.1504/IJESDF.2016.077444 |
224-233 | Besieged privacy in social networking servicesShujun Dong; Xingan Li DOI: 10.1504/IJESDF.2016.077447 |
234-249 | Privacy-enhanced distance computation with applicationsXiaojuan Chen; Yi Mu; Xiaofen Wang; Runhua Shi DOI: 10.1504/IJESDF.2016.077448 |
250-261 | An authentication scheme for multi-server environments based on chaotic mapsYun Tao DOI: 10.1504/IJESDF.2016.077450 |
262-284 | Generating optimal informed and adaptive watermark image based on zero-suppressed binary decision diagrams for medical imagesLamri Laouamer; Muath Alshaikh; Laurent Nana; Anca Chrisitine Pascu DOI: 10.1504/IJESDF.2016.077451 |