Journal: IJESDF

Volume 2, Issue 4

338 -- 354Athanasios Karantjias, Nineta Polemi. An innovative platform architecture for complex secure e/m-governmental services
355 -- 364Miltiades E. Anagnostou, Maria A. Lambrou. Privacy now and in the age of ambient intelligence
365 -- 376Charalampos Z. Patrikakis, Dimitris M. Kyriazanos, Athanasios Voulodimos, Ioannis G. Nikolakopoulos. Trust and security in Personal Network environments
377 -- 386Vasilios Zorkadis, Dimitrios A. Karras. On privacy-enhancing architectures for distribution of real time performance demanding mobile services
387 -- 406Hamid Jahankhani. Criminal investigation and forensic tools for smartphones
407 -- 423Maria Ntaliani, Constantina Costopoulou, Nikos Manouselis, Sotiris Karetsos. M-government services for rural SMEs
424 -- 434Elias Pimenidis, Alexander B. Sideridis, Eleni Antonopoulou. Mobile devices and services: bridging the digital divide in rural areas

Volume 2, Issue 3

239 -- 252Elias Pimenidis, Christos K. Georgiadis. Web services security evaluation considerations
253 -- 268David J. Boyd. A pragmatic approach to temporary payment card numbers
269 -- 279Bobby L. Tait, Sebastiaan H. von Solms. BioVault: biometrically based encryption
280 -- 305Amirhossein Taherinia, Mansour Jamzad. A robust spread spectrum watermarking method using two levels DCT
306 -- 321Cyril Onwubiko, Andrew P. Lenaghan. Challenges and complexities of managing information security
322 -- 333Alan Davidson, Rein Oja, Louise Yngström. A Swedish IT forensics course - expert opinions

Volume 2, Issue 2

116 -- 131Nigel Jones. IT forensics: 22 years on
132 -- 140Richard E. Overill. Development of masters modules in computer forensics and cybercrime for computer science and forensic science students
141 -- 155Gary C. Kessler, Robert Simpson, James Fry. Multidisciplinary learning using mock trials
156 -- 168Stuart J. Gibson, Christopher J. Solomon, Matthew I. S. Maylin, Clifford Clark. New methodology in facial composite construction: from theory to practice
169 -- 181Abhaya Induruwa. Mobile phone forensics: an overview of technical and legal aspects
182 -- 198Dave Childs, Paul Stephens. An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl
199 -- 205David Collins. XFT: a forensic toolkit for the original Xbox game console
206 -- 218Lynne Norris-Jones, Steve Marsh. An investigation into the technical, legal and ethical issues associated with biometrics in the UK (application to biometrics module for computing programmes)
219 -- 227Man Qi, Yongquan Wang, RongSheng Xu. Fighting cybercrime: legislation in China
228 -- 238Margaret Ross, Geoff Staples, Mark Udall. Cybercrime - raising awareness for future professionals

Volume 2, Issue 1

1 -- 17Malte Hesse, Norbert Pohlmann. European internet early warning system
18 -- 28Rosamaria Berte, Fabio Dellutri, Antonio Grillo, Alessandro Lentini, Gianluigi Me, Vittorio Ottaviani. Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm
29 -- 34Jan Seedorf, Kristian Beckers, Felipe Huici. Single-message denial-of-service attacks against voice-over-internet protocol terminals
35 -- 48Martin Rehák, Michal Pechoucek, Martin Grill, Karel Bartos, Vojtech Krmicek, Pavel Celeda. Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes
49 -- 57Hamid R. Alipour, Mostafa Esmaeili, Kashefi Kia. Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic
58 -- 67Rabia Sirhindi, Mehreen Afzal, Saeed Murtaza. An extended secret sharing scheme for colour images with fixed pixel expansion
68 -- 76Marjan Khatir, Seyed Mahmood Hejazi. How to find exculpatory and inculpatory evidence using a circular digital forensics process model
77 -- 91Clive Blackwell. A reasoning agent for credit card fraud using the event calculus
92 -- 100Iain Moir, George R. S. Weir. Contact centres and identity theft
101 -- 111Debajyoti Konar, Chandan Mazumdar. A generalised model of e-trading for gradual secret release fair exchange protocol