International Journal of Information and Computer Security
2013 Vol.5 No.3
Pages | Title and author(s) |
151-170 | Incremental processing and indexing for (k, e)-anonymisationJuggapong Natwichai; Xue Li; Asanee Kawtrkul DOI: 10.1504/IJICS.2013.055836 |
171-201 | On the conventional public key in identification-based encryption: the case of RSARkia Aouinatou; Mostafa Belkasmi DOI: 10.1504/IJICS.2013.055837 |
202-223 | Adaptive visible watermarking in Hadamard domain for digital imagesV. Santhi; Arunkumar Thangavelu; P. Arulmozhivarman DOI: 10.1504/IJICS.2013.055838 |
224-235 | Steganography in coloured images using wavelet domain-based saliency mapManish Mahajan; Navdeep Kaur DOI: 10.1504/IJICS.2013.055839 |
236-250 | Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2N) using parallel multipliers and architecturesQasem Abu Al-Haija; Ahmad Al Badawi DOI: 10.1504/IJICS.2013.055840 |