Skip to content
NADIA

IJSIA Vol. 10, No. 10, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 10, 2016 October
    • Anti-PUE Attack Base on Fractal Dimension in Spectrum Sensing, Xu Jie and Fu Shuang (pp. 1-12).
    • Evaluation of the Effectiveness of NFC-based Anti-Theft Security System for Motorbike, Taeseok Jin (pp. 13-20).
    • Double Validation Multi Level Proxy Blind Signature Scheme Key Management, Wang Jin-feng (pp. 21-28).
    • Application of Non-certificate Multi-level Proxy Digital Signature Scheme in Online Banking Transaction, Lin Zhu (pp. 29-36).
    • An Analytic Study of Cyber Security Strategies of Japan, Kyoungsik Min and Seung-Woan Chai (pp. 37-46).
    • A Fuzzy Relative Ratio Method for Construction Safety Management Performance Evaluation, Laijun Luo, Hui Zhou (pp. 47-56.
    • A Study on the Intention of Public Institution Managers and Procurement Business Bidding Managers to Use the e-Procurement System, Kil-hwan Shin, Choon Yeul Lee and Woon-heok Ko (pp. 57-66).
    • A General Encryption Algorithm for Different Format Videos, Hao Li, Cheng Yang, Jiayin Tian and Jianbo Liu (pp. 67-76).
    • Implementation of Multi-level Network Security Management System based Middleware Strategy, Yunliang Zou (pp. 77-88).
    • Mobile Security and its Application, Jun Hou Chan and Jer Lang Hong (pp. 89-106).
    • Network Information Security Research Based on the Grey Matter Element Analysis Method, Qingji Tian (pp. 107-118).
    • Security Analysis and Improvement of the TNC IF-T Protocol Binding for Tunneled EAP Methods, Yuelei Xiao (pp. 119-134).
    • Experimental Analysis using Robust Key Exchange Authentication Scheme in Mobile Ad-hoc Environments, Cheol-seung Lee (pp. 135-146).
    • RFID Tag Ownership Transfer Protocol of Multi-owner with Different Weights Based on Lagrange Algorithm, Gan Yong, Yang Zong-qin, He Lei and Du Chao (pp. 147-154).
    • An X-ray Inspection System for Illegal Object Classification based on Computer Vision, Yu Wang, Xiaomin Yang, Wei Wu, Bingshan Su and Gwanggil Jeon (pp. 155-168).
    • Sensitive Data Hiding Scheme for Internet of Things using Function Call Obfuscation Techniques, Jeongmi Shin and Yeonseung Ryu (pp. 169-180).
    • An Improved Zero-knowledge Identification Scheme based on Quasi-Dyadic Codes, Mu Han, Xiaolin Feng and Shidian Ma (pp. 181-190).
    • Image Watermarking Scheme Based on DWT-DCT and SSVD, Zhi Zhang, Chengyou Wang and Xiao Zhou (pp. 191-206).
    • Analysis and Comparison of Regulations for National Cybersecurity, Dea-woo Park (pp. 207-214).
    • A Secure and Efficient Multi-Factor Mutual Certificateless Authentication with Key Agreement Protocol for Mobile Client-Server Environment on ECC without the third-party, Liling Cao and Wancheng Ge (pp. 215-226).
    • Study on Displacement-based Design Method for Structures with Buckling Restrained Brace: Security and Seismic Design, Changhao Zhang, Wei Wang and Jianhu Feng (pp. 227-236).
    • Enhanced User Authentication Method Using USB Device Information, Jin-Hae Lee, Seon-Joo Kim, Jin-Woo Lee, Jin-Mook Kim and In-June Jo (pp. 237-248).
    • A Dynamic Semi Parametric Panel Spatial Lag Model for Brain Drain and Economic Stability Based on the Security Perspective, Shengming Chen, Yabin Zhang and Azhong Ye (pp. 24-260).
    • Design and Evaluation of Novel Effective Montgomery Modular Multiplication Architecture, Maryam Moayedi and Abdalhossein Rezai (pp. 261-270).
    • Reducing Computations in Chang et. al.,’s on-line Electronic Check, Zhili Zhou, Ching-Nung Yang and Chih-Fei Chen (pp. 271-288).
    • False Information Diffusion in Public Crisis on Interpersonal Network and Intervention Strategies, Zhu Xiaoxia, Hao Jiajia and Hu Haiju (pp. 289-302).
    • Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption, Nyamsuren Vaanchig, Wei Chen and Zhiguang Qin (pp. 303-320).
    • Detection and Performance Analysis of Wormhole Attack in MANET using DELPHI Technique, Sandeep Kumar Arora and Ayushree (pp. 321-330).
    • Study on Cybersecurity of Hybrid, Multi-hop, Wireless Network, Li Li and Hu Zhiyu (pp. 331-340).
    • The Data Processing Approach for Preserving Personal Data in FinTech-Driven Paradigm, Kyongjin Kim and Sengphil Hong (pp. 341-350).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA