
International Journal of Electronic Security and Digital Forensics
2018 Vol.10 No.2
Pages | Title and author(s) |
109-137 | A novel smooth texture-based visual cryptography approach for secure communicationRam Chandra Barik; Sitanshu Sekhar Sahu; Suvamoy Changder DOI: 10.1504/IJESDF.2018.090949 |
138-154 | Effective methods to detect metamorphic malware: a systematic reviewMustafa Irshad; Haider M. Al-Khateeb; Ali Mansour; Moses Ashawa; Muhammad Hamisu DOI: 10.1504/IJESDF.2018.090948 |
155-167 | Improvement of signature scheme based on factoring and chaotic mapsNedal Tahat; Eddie Shahril Ismail DOI: 10.1504/IJESDF.2018.090955 |
168-187 | Certificateless aggregate deniable authentication protocol for ad hoc networksChunhua Jin; Jianyang Zhao DOI: 10.1504/IJESDF.2018.090958 |
188-203 | An efficient certificateless aggregate signature without pairingYunyun Qu; Quanwu Mu DOI: 10.1504/IJESDF.2018.090961 |