SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Second International Conference on Information Security and Digital Forensics (ISDF2015)
-
Dealerless Multi-Server Timed-Release Encryption Scheme with Privacy-Preserving Encoding
The idea of “sending messages into the future” was first introduced in 1993 and brought up a new research track of timed-release encryption (TRE) scheme. However, most TRE schemes are constructed ...Authors: Shao-Heng Chen, Fu-Kuo Tseng and Rong-Jaye Chen
Year Published: Sep. 2015 | 1-8 | ISDF2015 -
Network Attack Strategy by Topological Analysis
In general, Network attack should be prohibited and information security technology should contribute to the improvement for trust of network communication. Network communication is based on IP ...Authors: Kengo Komoriya, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa
Year Published: Sep. 2015 | 9-20 | ISDF2015 -
Selecting Elliptic Curves with Minimal Estimation of Pairing Computation
In recent years, more and more applications based on bilinear pairing computation have been constructed. The very first issue is to pick up a pairingfriendly elliptic curve, which is efficient and ...Authors: Yi-Tang Chang, Yung-Hsiang Liu and Rong-Jaye Chen
Year Published: Sep. 2015 | 21-29 | ISDF2015 -
Digital Camera Identification Using Sensor Pattern Noise
With the advance of IT technology, multimedia contents are widely used and distributed. Since novice uses them for illegal purpose, there are needs for protecting contents and blocking illegal usage ...Authors: Sang-Hyeong Lee, Tae-Woo Oh, Kibom Kim and Hae-Yeoun Lee
Year Published: Sep. 2015 | 30-35 | ISDF2015 -
Validation of the Technological Change Framework: A Case Study of Challenges of Physicians by using Electronic Health Record Systems (EHRs) in a Developing Country
The Electronic Health Record System is an innovative technology in the health care sector with many arguments about benefits and challenges. Despite the potential positive effects, the rate of ...Authors: Sana Mehak Faizi, Imran Medi
Year Published: Sep. 2015 | 36-52 | ISDF2015 -
Modern Windows Operating Systems Vulnerabilities
This paper presents the comparison and analysis of vulnerabilities in modern Windows operating systems. Modern tools available on the Internet have been used in order to provide evidence regarding ...Authors: Theodoros Arambatzis, Ioannis Lazaridis and Sotirios Pouros
Year Published: Sep. 2015 | 53-58 | ISDF2015