


default search action
International Journal of Electronic Security and Digital Forensics, Volume 7
Volume 7, Number 1, 2015
- Youwen Zhu, Tsuyoshi Takagi:

Efficient scalar product protocol and its privacy-preserving application. 1-19 - Bouguerne Imen, Yamina Tlili Guiyassa:

Steganographic detection in image using the reduction of support vectors. 20-29 - Hari Narayan Khan, Ayan Chaudhuri, Souvik Kar, Parijat Roy, Atal Chaudhuri:

Robust symmetric cryptography using plain-text variant session key. 30-40 - Zhiwen Hu

, Li Zhu, Huaqing Mao:
Random linear network coding with probabilistic polynomial-time wiretap adversary. 41-53 - Sandip Ghosal

, Debasis Mitra, Subhasis Bhattacharjee:
Certificate-based encoding of gate level description for secure transmission. 54-75 - Jonathan Goh, Vrizlynn L. L. Thing:

A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection. 76-104
Volume 7, Number 2, 2015
- P. Vijayakumar

, V. Vijayalakshmi, G. Zayaraz:
Hybrid secure GSM architecture using DNA computing-based hyperelliptic curve cryptography. 105-118 - Digambar Povar

, S. Saibharath, G. Geethakumari:
Real-time digital forensic triaging for cloud data analysis using MapReduce on Hadoop framework. 119-133 - Vesta Matveeva:

Assessment of uniformity of byte distribution in a file based on the wavelet transform as an approach to search encrypted data. 134-146 - Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, Junwei Wen:

A post-quantum communication secure identity-based proxy-signcryption scheme. 147-165 - Jie Cui, Hong Zhong, Runhua Shi, Jiankai Wang:

Related-key cryptanalysis on 7-round AES-128/192. 166-178 - Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li:

An efficient certificateless deniable authentication protocol without pairings. 179-196 - Pengshuai Qiao:

A security enhanced user authentication scheme for multi-server environment without using smart cards. 197-210
Volume 7, Number 3, 2015
- P. P. Joby

, P. Sengottuvelan:
A localised clustering scheme to detect attacks in wireless sensor network. 211-222 - D. Raveena Judie Dolly

, G. Josemin Bala, J. Dinesh Peter
:
Adaptation of frames for GOP using NSEW affine translation for effective privacy protection mechanism. 223-233 - N. M. Siva Mangai

, Shilu Tresa Vinod, D. Abraham Chandy:
Recognition of elephants in infrared images using clustering-based image segmentation. 234-244 - M. Duraipandian

, C. Palanisamy:
Network layer intrusion detection in mobile ad hoc network using on-demand attack detection protocol. 245-257 - Alireza Jolfaei

, Ahmadreza Matinfar, Abdolrasoul Mirghadri:
Preserving the confidentiality of digital images using a chaotic encryption scheme. 258-277 - Sharmila Kishor Wagh, Satish R. Kolhe

:
Effective semi-supervised approach towards intrusion detection system using machine learning techniques. 290-304
Volume 7, Number 4, 2015
- Sunil K. Moon, Rajeshree D. Raut:

Efficient performance analysis of data hiding technique for enhancement of information security, robustness and perceptibility. 305-329 - Wenxia Zhu, Jianhua Chen, Debiao He:

Enhanced authentication protocol for session initiation protocol using smart card. 330-342 - Indradip Banerjee

, Pabak Indu
, Anupam Pratap Singh, Souvik Bhattacharyya
, Gautam Sanyal:
Robust watermarking using four bit per pixel technique. 345-357 - Prabir Kumar Naskar

, Atal Chaudhuri
:
A robust image encryption technique using dual chaotic map. 358-380 - Allan Charles Watt, Jill Slay

:
First responders actions to cope with volatile digital evidence. 381-399

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














