Skip to content
NADIA

IJSIA Vol. 1, No. 2, 2007

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2007
2007
Volume 1, Number 2, 2007 October
    • Secure distribution of neural networks in wireless sensor networks, Joo Seung Yoon, Hee Moon Kim, Gil Ju Lee, Il Hee Kim and Yongsu Park (pp. 1-8).
    • A Conference Key Distribution Scheme Using Interpolating Polynomials, Chin-Chen Chang, Chu-Hsing Lin and Chien-Yuan Chen (pp. 9-20).
    • Simulation of Distributed Key Management Protocols in Clustered Wireless Sensor Networks, Jibi Abraham and K S Ramanatha (pp. 21-32).
    • An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards, Chin-Chen Chang, Hao-Chuan Tsai and Yi-Hui Chen (pp. 33-40).
    • Performance Analysis of Color Channel for DCT Based Image Watermarking Scheme, Vikas Saxena, Paridhi Khemka, Aditi Harsulkar and JP Gupta (pp. 41-46).
    • A Scalable PKI Based on P2P Network, Zhiwei Gao, Jinsheng Fan, Yufeng Jia and Li Zhang (pp. 47-58).
    • A Framework for User Privacy Protection Using Trusted Programs, Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, and Makoto Amamiya (pp. 59-70).
    • Applying RFID to Secure the Pharmaceutical Supply Chain, Brian King and Xiaolan Zhang (pp. 71-84).
    • A Real Time Voice Transmission Method for Voice Privacy between CDMA Mobile and PSTN Terminal, Yong-Seok Park, Kyoung-Seob Kim, Jaehwan Ahn, Choon-Soo Kim and Jae-Cheol Ryou (pp. 85-98).
    • Physical Threat Description of Smart Card Protection Profile in Security Level 1st, Sang-Soo Yeo, Sang-Jo Youk, Gil-cheol Park, Seok-soo Kim and Tai-hoon Kim (pp. 99-104).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA