2011
2011
Volume 5, Number 4, 2011 October
-
- A Novel Mutual Authentication Scheme Based on Fingerprint Biometric and Nonce Using Smart Cards, De-song Wang, Jian-ping Li (pp. 1-12).
- Implementation of a Police Intelligence Analysis Framework, Dafni Stampouli, Matthew Roberts, Gavin Powell, Tomás Sánchez López (pp. 13-22).
- Detecting JFIF Header using FORHEADER, Kamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris (pp. 23-36).
- Witness Interviews: Does recall of relational information improve identifiability of a facial composite?, Faye Skelton, Charlie Frowd, Sally Andrews (pp. 37-48).
- Secret Key Awareness Security Public Key Encryption Scheme, Guoyan Zhang and Qiuliang Xu (pp. 49-58).
- The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review, Soltan Alharbi, Jens Weber-Jahnke, Issa Traore (pp. 59-72).
- Framework and Models for Multistep Attack Detection, Mirco Marchetti, Michele Colajanni, Fabio Manganiello (pp. 73-90).
- Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis, Lukáš Ďurfina, Jakub Křoustek, Petr Zemek, Dušan Kolář, Tomáš Hruška, Karel Masařík, and Alexander Meduna (pp. 91-106).
- 2SC: an Efficient Code-based Stream Cipher, Mohammed Meziani, Pierre-Louis Cayrel, and Sidi Mohamed El Yousfi Alaoui (pp. 107-116).
- A Password Attack on S-3 PAKE, R. Padmavathy (pp. 117-122).
- GPU Implementation of the Keccak Hash Function Family, Pierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider (pp. 123-132).
- Recent progress in code-based cryptography, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani and Robert Niebuhr (pp. 133-144).