Report date: Apr 23, 2024 Conflict count: 350216 Publisher: Inderscience Enterprises Ltd. Title count: 330 Conflict count: 3303 ========================================================== Created: 2018-01-10 07:30:10.0 ConfID: 5313563 CauseID: 1420042912 OtherID: 1418944443 JT: International Journal of Electronic Security and Digital Forensics MD: Zhang, 10 ,1,20,2018,Efficient multi-receiver identity-based signcryption from lattice assumption DOI: 10.1504/IJESDF.2018.10009828(Journal) (5313563-N ) DOI: 10.1504/IJESDF.2018.089202(Journal) ========================================================== Created: 2018-01-10 07:30:10.0 ConfID: 5313564 CauseID: 1420042912 OtherID: 1418944444 JT: International Journal of Electronic Security and Digital Forensics MD: Tamma, 10 ,1,1,2018,A novel chaotic hash-based attribute-based encryption and decryption on cloud computing DOI: 10.1504/IJESDF.2018.10009829(Journal) (5313564-N ) DOI: 10.1504/IJESDF.2018.089203(Journal) ========================================================== Created: 2018-01-10 07:30:10.0 ConfID: 5313565 CauseID: 1420042912 OtherID: 1418944451 JT: International Journal of Electronic Security and Digital Forensics MD: Zhuo, 10 ,1,97,2018,Novel image watermarking method based on FRWT and SVD DOI: 10.1504/IJESDF.2018.10009836(Journal) (5313565-N ) DOI: 10.1504/IJESDF.2018.089218(Journal) ========================================================== Created: 2018-04-05 07:30:03.0 ConfID: 5355450 CauseID: 1424149899 OtherID: 1423798005 JT: International Journal of Electronic Security and Digital Forensics MD: Tahat, 10 ,2,155,2018,Improvement of signature scheme based on factoring and chaotic maps DOI: 10.1504/IJESDF.2018.10011979(Journal) (5355450-N ) DOI: 10.1504/IJESDF.2018.090955(Journal) ========================================================== Created: 2018-07-05 07:30:11.0 ConfID: 5385721 CauseID: 1428507479 OtherID: 1425716476 JT: International Journal of Electronic Security and Digital Forensics MD: Mesleh, 10 ,3,207,2018,Black hole attack evaluation for AODV and AOMDV routing protocols DOI: 10.1504/IJESDF.2018.10013056(Journal) (5385721-N ) DOI: 10.1504/IJESDF.2018.092994(Journal) ========================================================== Created: 2018-07-05 07:30:11.0 ConfID: 5385722 CauseID: 1428507479 OtherID: 1425716485 JT: International Journal of Electronic Security and Digital Forensics MD: Arabeyyat, 10 ,3,228,2018,Information security model using decision tree for Jordanian public sector DOI: 10.1504/IJESDF.2018.10013062(Journal) (5385722-N ) DOI: 10.1504/IJESDF.2018.093013(Journal) ========================================================== Created: 2018-07-05 07:30:11.0 ConfID: 5385723 CauseID: 1428507479 OtherID: 1425716479 JT: International Journal of Electronic Security and Digital Forensics MD: Cui, 10 ,3,292,2018,Secure and efficient authentication scheme for access control in mobile pay-TV systems DOI: 10.1504/IJESDF.2018.10013063(Journal) (5385723-N ) DOI: 10.1504/IJESDF.2018.093014(Journal) ========================================================== Created: 2018-07-05 07:30:11.0 ConfID: 5385724 CauseID: 1428507479 OtherID: 1425716492 JT: International Journal of Electronic Security and Digital Forensics MD: Nasrullah, 10 ,3,311,2018,LSB based audio steganography preserving minimum sample SNR DOI: 10.1504/IJESDF.2018.10013069(Journal) (5385724-N ) DOI: 10.1504/IJESDF.2018.093028(Journal)