Report date: Nov 6,2024 Conflict count: 361874 Publisher: Inderscience Enterprises Ltd. Title count: 333 Conflict count: 3421 ========================================================== Created: 2018-07-05 07:30:11 ConfID: 5385722 CauseID: 1428507479 OtherID: 1425716485 JT: International Journal of Electronic Security and Digital Forensics MD: Arabeyyat,10,3,228,2018,Information security model using decision tree for Jordanian public sector DOI: 10.1504/IJESDF.2018.10013062(Journal) (5385722-N) DOI: 10.1504/IJESDF.2018.093013(Journal) ========================================================== Created: 2018-07-05 07:30:11 ConfID: 5385723 CauseID: 1428507479 OtherID: 1425716479 JT: International Journal of Electronic Security and Digital Forensics MD: Cui,10,3,292,2018,Secure and efficient authentication scheme for access control in mobile pay-TV systems DOI: 10.1504/IJESDF.2018.10013063(Journal) (5385723-N) DOI: 10.1504/IJESDF.2018.093014(Journal) ========================================================== Created: 2018-07-05 07:30:11 ConfID: 5385721 CauseID: 1428507479 OtherID: 1425716476 JT: International Journal of Electronic Security and Digital Forensics MD: Mesleh,10,3,207,2018,Black hole attack evaluation for AODV and AOMDV routing protocols DOI: 10.1504/IJESDF.2018.10013056(Journal) (5385721-N) DOI: 10.1504/IJESDF.2018.092994(Journal) ========================================================== Created: 2018-07-05 07:30:11 ConfID: 5385724 CauseID: 1428507479 OtherID: 1425716492 JT: International Journal of Electronic Security and Digital Forensics MD: Nasrullah,10,3,311,2018,LSB based audio steganography preserving minimum sample SNR DOI: 10.1504/IJESDF.2018.10013069(Journal) (5385724-N) DOI: 10.1504/IJESDF.2018.093028(Journal) ========================================================== Created: 2018-01-10 07:30:10 ConfID: 5313563 CauseID: 1420042912 OtherID: 1418944443 JT: International Journal of Electronic Security and Digital Forensics MD: Zhang,10,1,20,2018,Efficient multi-receiver identity-based signcryption from lattice assumption DOI: 10.1504/IJESDF.2018.10009828(Journal) (5313563-N) DOI: 10.1504/IJESDF.2018.089202(Journal) ========================================================== Created: 2018-01-10 07:30:10 ConfID: 5313565 CauseID: 1420042912 OtherID: 1418944451 JT: International Journal of Electronic Security and Digital Forensics MD: Zhuo,10,1,97,2018,Novel image watermarking method based on FRWT and SVD DOI: 10.1504/IJESDF.2018.10009836(Journal) (5313565-N) DOI: 10.1504/IJESDF.2018.089218(Journal) ========================================================== Created: 2018-01-10 07:30:10 ConfID: 5313564 CauseID: 1420042912 OtherID: 1418944444 JT: International Journal of Electronic Security and Digital Forensics MD: Tamma,10,1,1,2018,A novel chaotic hash-based attribute-based encryption and decryption on cloud computing DOI: 10.1504/IJESDF.2018.10009829(Journal) (5313564-N) DOI: 10.1504/IJESDF.2018.089203(Journal) ========================================================== Created: 2018-04-05 07:30:03 ConfID: 5355450 CauseID: 1424149899 OtherID: 1423798005 JT: International Journal of Electronic Security and Digital Forensics MD: Tahat,10,2,155,2018,Improvement of signature scheme based on factoring and chaotic maps DOI: 10.1504/IJESDF.2018.10011979(Journal) (5355450-N) DOI: 10.1504/IJESDF.2018.090955(Journal)