Skip to content
NADIA

IJSIA Vol. 10, No. 12, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2016
2016
Volume 10, Number 12, 2016 December
    • Research on Access Control and Encryption Transmission of 6LoWPAN, Fan Tongrang, He Bingchao, Zhao Wenbin, Huang Xin, Yu Tao (pp. 1-12).
    • A Novel Technique for Detection & Isolation of Blackhole Attack, Shivani Vijan and Sandeep Kumar Arora (pp. 13-20).
    • Design and Implementation of Inter-core Communication of Embedded Multiprocessor Based on Shared Memory, Yang Nie, Lili Jing, Pengyu Zhao (pp. (21-30).
    • Real-time Evaluation Mechanism Based on Double Evidence Classification of User Behavior, Jiale Zhang, Guiling Zhang and Xiufang Zhang (pp. 31-42).
    • Meter-HES Mutual Authentication in the Smart Grid AMI Environment, Seung-hwan Ju, Young-in Park, Sang-gyoo Sim, Myung-chul Lim, Sung-hyu Han, Hee-suk Seo (pp. (43-52).
    • Research on a structure of the Multimedia list Oriented Network Intrusion Detection System, Xu Zhao, Jin Jiang and Max Stinnett (pp. 53-68).
    • Design of a Secure Biometric Authentication Framework Using PKI and FIDO in Fintech Environments, Jae Jung Kim and Seng Phil Hong (pp. 69-80).
    • An Efficient Public Auditing Scheme for Multi-Cloud Storage, Haiyang Yu, Yongquan Cai, Shanshan Kong, Fei Xue and Ditta Allah (pp. 81-96).
    • Semi-quantum Key Distribution Protocol Based on Bell States, Ting Wang, Dongning Zhao, Zhiwei Sun, Weixin Xie (pp. 97-110.
    • A New Ultra Lightweight Encryption Design for Security at Node Level, Gaurav Bansod (pp. 111-128).
    • Security Detection of Building Structure Based on Sparse Encoding Deep Learning Algorithm, Zheng Li (pp. 129-140).
    • Research on Information Security Audit Base on Semantic Web Ontology and Improve Vector Space Model, Zhanjiang Wang, Shuoning Wang, Ling Wang (pp. (141-152).
    • Role Performance Trust-Based Access Control for Protecting Sensitive Attributes, Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd Sani, Hamidah Ibrahim (pp. 153-172).
    • An Anomaly Detection Algorithm based on Online Learning Lagrangian SVM for Cloud Computing Environment, GuiPing Wang, Ren Li, XiaoYi Yuan (pp. 173-188).
    • Effect of Easy Transaction, Consumer Interests, and Systems Security Level Measures against Fraud Online Shopping in Lazada, Meiliyah Ariani, Zulhawati (pp. 189-206).
    • Research on Coupling Coordination Degree of Security Emergency Management in Coal Mine, Gang He, Yanna Zhu, Guisheng Zhang, Guotong Qiao (pp. 207-218).
    • An Intrusion Prevention Technology Based on Dynamic Random Password Authentication in Wireless Sensor Networks, Xiaolong Xu, Zhonghe Gao, Lijuan Han (pp. 219-228).
    • The Secure IEEE 11073:20601 Protocol and Agent Structure for Protecting PHD, Doyoung Chung, Gaeil An, Sokjoon Lee, Byungho Chung (pp. 229-240).
    • A New Kind of Image Encryption Algorithm based on Improvement Bit Plane, Honge Ren, Xiyan Xu, Jian Zhang, Yali Chen (pp. 241-250).
    • Static Anomaly Detection Framework for Android-based Mobile Phones, Xiaobo Ji, Fan Zeng, Bangxian Ye (pp. 251-260).
    • Java Implementation of a Cloud-based SIM Secure Element NFC Payment Protocol, Pardis Pourghomi, Şadi Evren Şeker, Gheorghita Ghinea, Wassim Masri (pp. 261-282).
    • Research on Trust-Based Access Control in The Internet of Things, Xiao-hui Cheng, Meng Hu, Tong Wang, Yun Deng (pp. 283-288).
    • Copy Detection Technique with Enhanced Efficiency by using Substring Comparison Algorithm, U. Nanaji, N. Thirupathi Rao, Ch. Raj Kumar, Debnath Bhattacharyya, Hye-jin Kim (pp. 289-298).
    • Voice Playback Detection based on Long-window Scale-factors, Yanan Chen, Rangding Wang, Diqun Yan, Chao Jin (pp. 299-310).
    • Cryptanalysis of a Multiple Server Smart Card based Authentication Scheme, Kwang Cheul Shin (pp. 311-322).
    • Time-Varying Neural Networks for Dynamical Systems Modeling with Application to Image Compression, Ying Kong, Hui-juan Lu (pp. 323-334).
    • A Multi-attribute Keyword Retrieval Mechanism for Encrypted Cloud Data, Yunfa Li, Mingyi Li, Yangyang Shen (pp. 335-346).
    • Network Security Prediction Method Based on Kalman Filtering Fusion Decision Entropy Theory, Liang Huang, Xinhao Chen, Xinsheng Lai (pp. 347-358).
    • Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian Theory, Xianyou Zhu (pp. 359-368).
    • A Survey of Unconstrained Face Recognition Algorithm and Its Applications, Ranbeer Tyagi, Geetam Singh Tomar, Namkyun Baik (pp. 369-376).
    • GABP Neural Network Algorithm Applied in Evaluation of Computer Network Security, Xiaochun He, JunJun Feng, Ruchun Jia (pp. 377-388).
    • A Multi Dimension Service Trust Model in Social Network, Leiyue Yao, Qianglai Xie (pp. 389-398).
    • A Secure Ownership Transfer Protocol Supporting Face to Face Transactions for RFID Tag, Lyu Xin-mei, Zhang Tao (pp. 399-408).
    • The Impacts of Smartphone Addiction and Technostress on Customer Satisfaction and Loyalty, DaeEop Kim and Jae-Ik Shin (pp. 409-418).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA