Search dblp for Publications

export results for "toc:db/journals/ijesdf/ijesdf9.bht:"

 download as .bib file

@article{DBLP:journals/ijesdf/Al-SalehA17,
  author       = {Mohammed I. Al{-}Saleh and
                  Mona J. Al{-}Shamaileh},
  title        = {Forensic artefacts associated with intentionally deleted user accounts},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {2},
  pages        = {167--179},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10003678},
  doi          = {10.1504/IJESDF.2017.10003678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Al-SalehA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Ashouri-Talouki17,
  author       = {Maede Ashouri{-}Talouki and
                  Ahmad Baraani{-}Dastjerdi},
  title        = {Cryptographic collusion-resistant protocols for secure sum},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {1},
  pages        = {19--34},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10002631},
  doi          = {10.1504/IJESDF.2017.10002631},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Ashouri-Talouki17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BarnardHD17,
  author       = {Jacques Barnard and
                  Magda Huisman and
                  G{\"{u}}nther Drevin},
  title        = {Security awareness and the use of location-based services, technologies
                  and games},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {4},
  pages        = {293--325},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10008010},
  doi          = {10.1504/IJESDF.2017.10008010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/BarnardHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChandeCL17,
  author       = {Manoj Kumar Chande and
                  Te{-}Yu Chen and
                  Cheng{-}Chi Lee},
  title        = {An improved multi-signature scheme for specified group of verifiers},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {2},
  pages        = {180--190},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10004414},
  doi          = {10.1504/IJESDF.2017.10004414},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ChandeCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChenCS17,
  author       = {Haoran Chen and
                  Jianhua Chen and
                  Han Shen},
  title        = {An improved authenticated key agreement with anonymity for session
                  initiation protocol},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {2},
  pages        = {132--149},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10004413},
  doi          = {10.1504/IJESDF.2017.10004413},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ChenCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/CulmoneV17,
  author       = {Rosario Culmone and
                  Maria Concetta De Vivo},
  title        = {Vanishing files: protocols and regulations for immaterial documents},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {1},
  pages        = {45--61},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10002641},
  doi          = {10.1504/IJESDF.2017.10002641},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/CulmoneV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/CunhaCP17,
  author       = {Ilane Cunha and
                  Jefferson Rodrigo A. Cavalcante and
                  Ahmed Patel},
  title        = {A proposal for curriculum development of educating and training Brazilian
                  police officers in digital forensics investigation and cybercrime
                  prosecution},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {3},
  pages        = {209--238},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10005633},
  doi          = {10.1504/IJESDF.2017.10005633},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/CunhaCP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GranjaR17,
  author       = {Fernando Molina Granja and
                  Glen Dario Rodriguez Rafael},
  title        = {The preservation of digital evidence and its admissibility in the
                  court},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {1},
  pages        = {1--18},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10002624},
  doi          = {10.1504/IJESDF.2017.10002624},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/GranjaR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GranjaR17a,
  author       = {Fernando Molina Granja and
                  Glen Dario Rodriguez Rafael},
  title        = {Model for digital evidence preservation in criminal research institutions
                  - {PREDECI}},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {2},
  pages        = {150--166},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10004412},
  doi          = {10.1504/IJESDF.2017.10004412},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/GranjaR17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HinteaBG17,
  author       = {Diana Hintea and
                  Robert Bird and
                  Michael Green},
  title        = {An investigation into the forensic implications of the Windows 10
                  operating system: recoverable artefacts and significant changes from
                  Windows 8.1},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {4},
  pages        = {326--345},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10008013},
  doi          = {10.1504/IJESDF.2017.10008013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/HinteaBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/IsaHAMM17,
  author       = {Mohd Anuar Mat Isa and
                  Habibah Hashim and
                  Syed Farid Syed Adnan and
                  Norhaflyza Marbukhari and
                  Nur Nabila Mohamed},
  title        = {An automobile security protocol: side-channel security against timing
                  and relay attacks},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {3},
  pages        = {239--253},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10005632},
  doi          = {10.1504/IJESDF.2017.10005632},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/IsaHAMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JeevaR17,
  author       = {S. Carolin Jeeva and
                  Elijah Blessing Rajsingh},
  title        = {Phishing {URL} detection-based feature selection to classifiers},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {2},
  pages        = {116--131},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10004411},
  doi          = {10.1504/IJESDF.2017.10004411},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/JeevaR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KaurDST17,
  author       = {Arashdeep Kaur and
                  Malay Kishore Dutta and
                  Krishan Mohan Soni and
                  Nidhi Taneja},
  title        = {Embedding digital watermark in one-dimensional signals using wavelet
                  and Schur decomposition},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {4},
  pages        = {362--380},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10007972},
  doi          = {10.1504/IJESDF.2017.10007972},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KaurDST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MistryD17,
  author       = {Nilay R. Mistry and
                  Mohindersinh Dahiya},
  title        = {VolNet: a framework for analysing network-based artefacts from volatile
                  memory},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {2},
  pages        = {101--115},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10004409},
  doi          = {10.1504/IJESDF.2017.10004409},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MistryD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MizherAMM17,
  author       = {Manar Abduljabbar Ahmad Mizher and
                  Mei Choo Ang and
                  Ahmad A. Mazhar and
                  Manal A. Mizher},
  title        = {A review of video falsifying techniques and video forgery detection
                  techniques},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {3},
  pages        = {191--208},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10005634},
  doi          = {10.1504/IJESDF.2017.10005634},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MizherAMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MondalSSM17,
  author       = {Jayanta Mondal and
                  Debabala Swain and
                  Dushant P. Singh and
                  Sharmila Mohanty},
  title        = {An improved LSB-based {RDH} technique with better reversibility},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {3},
  pages        = {254--268},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10005631},
  doi          = {10.1504/IJESDF.2017.10005631},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MondalSSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Pan17,
  author       = {Jonathan Pan},
  title        = {Encryption scheme classification: a deep learning approach},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {4},
  pages        = {381--395},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10008036},
  doi          = {10.1504/IJESDF.2017.10008036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Pan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PatilM17,
  author       = {Dinesh N. Patil and
                  Bandu Baburao Meshram},
  title        = {An evidence collection and analysis of Windows registry},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {4},
  pages        = {346--361},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10008016},
  doi          = {10.1504/IJESDF.2017.10008016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/PatilM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SatryaNS17,
  author       = {Gandeva B. Satrya and
                  A. Ahmad Nasrullah and
                  Soo Young Shin},
  title        = {Identifying artefact on Microsoft OneDrive client to support Android
                  forensics},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {3},
  pages        = {269--291},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10005630},
  doi          = {10.1504/IJESDF.2017.10005630},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SatryaNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Sriratanaviriyakul17,
  author       = {Narumon Cherry Sriratanaviriyakul and
                  Mathews Z. Nkhoma and
                  Anna Lyza Felipe and
                  Thanh Kim Cao and
                  Quyen Ha Tran and
                  Roger Epworth and
                  Avinash Shankaranarayanan and
                  Huy Le Quang},
  title        = {{ASEAN} users' privacy concerns and security in using online social
                  networks},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {1},
  pages        = {84--99},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10002659},
  doi          = {10.1504/IJESDF.2017.10002659},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Sriratanaviriyakul17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TajbakhshHS17,
  author       = {Mehrdad Tajbakhsh and
                  Elaheh Homayounvala and
                  Sajjad Shokouhyar},
  title        = {Forensically ready digital identity management systems, issues of
                  digital identity life cycle and context of usage},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {1},
  pages        = {62--83},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10002653},
  doi          = {10.1504/IJESDF.2017.10002653},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/TajbakhshHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/YanCZ17,
  author       = {Lili Yan and
                  Yan Chang and
                  Shibin Zhang},
  title        = {Comments on 'An improved authentication scheme for mobile satellite
                  communication systems'},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {4},
  pages        = {396--406},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10008037},
  doi          = {10.1504/IJESDF.2017.10008037},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/YanCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhuoZ17,
  author       = {Zhi{-}hai Zhuo and
                  Ning Zhong},
  title        = {A new kind of steganography schemes for image},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {9},
  number       = {1},
  pages        = {35--44},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJESDF.2017.10002635},
  doi          = {10.1504/IJESDF.2017.10002635},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ZhuoZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics