default search action
International Journal of Electronic Security and Digital Forensics, Volume 7
Volume 7, Number 1, 2015
- Youwen Zhu, Tsuyoshi Takagi:
Efficient scalar product protocol and its privacy-preserving application. 1-19 - Bouguerne Imen, Yamina Tlili Guiyassa:
Steganographic detection in image using the reduction of support vectors. 20-29 - Hari Narayan Khan, Ayan Chaudhuri, Souvik Kar, Parijat Roy, Atal Chaudhuri:
Robust symmetric cryptography using plain-text variant session key. 30-40 - Zhiwen Hu, Li Zhu, Huaqing Mao:
Random linear network coding with probabilistic polynomial-time wiretap adversary. 41-53 - Sandip Ghosal, Debasis Mitra, Subhasis Bhattacharjee:
Certificate-based encoding of gate level description for secure transmission. 54-75 - Jonathan Goh, Vrizlynn L. L. Thing:
A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection. 76-104
Volume 7, Number 2, 2015
- P. Vijayakumar, V. Vijayalakshmi, G. Zayaraz:
Hybrid secure GSM architecture using DNA computing-based hyperelliptic curve cryptography. 105-118 - Digambar Povar, S. Saibharath, G. Geethakumari:
Real-time digital forensic triaging for cloud data analysis using MapReduce on Hadoop framework. 119-133 - Vesta Matveeva:
Assessment of uniformity of byte distribution in a file based on the wavelet transform as an approach to search encrypted data. 134-146 - Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, Junwei Wen:
A post-quantum communication secure identity-based proxy-signcryption scheme. 147-165 - Jie Cui, Hong Zhong, Runhua Shi, Jiankai Wang:
Related-key cryptanalysis on 7-round AES-128/192. 166-178 - Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li:
An efficient certificateless deniable authentication protocol without pairings. 179-196 - Pengshuai Qiao:
A security enhanced user authentication scheme for multi-server environment without using smart cards. 197-210
Volume 7, Number 3, 2015
- P. P. Joby, P. Sengottuvelan:
A localised clustering scheme to detect attacks in wireless sensor network. 211-222 - D. Raveena Judie Dolly, G. Josemin Bala, J. Dinesh Peter:
Adaptation of frames for GOP using NSEW affine translation for effective privacy protection mechanism. 223-233 - N. M. Siva Mangai, Shilu Tresa Vinod, D. Abraham Chandy:
Recognition of elephants in infrared images using clustering-based image segmentation. 234-244 - M. Duraipandian, C. Palanisamy:
Network layer intrusion detection in mobile ad hoc network using on-demand attack detection protocol. 245-257 - Alireza Jolfaei, Ahmadreza Matinfar, Abdolrasoul Mirghadri:
Preserving the confidentiality of digital images using a chaotic encryption scheme. 258-277 - Sharmila Kishor Wagh, Satish R. Kolhe:
Effective semi-supervised approach towards intrusion detection system using machine learning techniques. 290-304
Volume 7, Number 4, 2015
- Sunil K. Moon, Rajeshree D. Raut:
Efficient performance analysis of data hiding technique for enhancement of information security, robustness and perceptibility. 305-329 - Wenxia Zhu, Jianhua Chen, Debiao He:
Enhanced authentication protocol for session initiation protocol using smart card. 330-342 - Indradip Banerjee, Pabak Indu, Anupam Pratap Singh, Souvik Bhattacharyya, Gautam Sanyal:
Robust watermarking using four bit per pixel technique. 345-357 - Prabir Kumar Naskar, Atal Chaudhuri:
A robust image encryption technique using dual chaotic map. 358-380 - Allan Charles Watt, Jill Slay:
First responders actions to cope with volatile digital evidence. 381-399
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.