Skip to content
NADIA

IJSIA Vol. 11, No. 3, 2017

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2017
2017
Volume 11, Number 3, 2017 March
    • A Social Popularity Based Probabilistic Routing in Delay Tolerant Network, Jianbo Li, Youmei Song and Shan Jiang (pp. 1-16).
    • Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman, Samiksha Sharma and Vinay Chopra (pp. 17-28).
    • Dynamic Analysis on the Volatility of China Stock Market Based on CSI 300: A Financial Security Perspective, Xiongbing Chen and Ning Zhang (pp. 29-38).
    • Technique to Generate Variable Keys with Key Variation with Noise Burst Bit for Achieving Perfect Security in Cryptology towards Optimum Data Transfer, Moumita Das, Rajat Subhra Goswami, Manash P Dutta, S. K. Chakraborty and C. T. Bunia (pp. 39-50).
    • Empirical Research on Network Size and Technological Progress, Yabin Zhang, Qiang Chen and Tianli Xiong (pp. 51-60).
    • An Approach to Generate Variable Keys based on Vertical Horizontal Mechanism, Chukhu Chunka, Rajat Subhra Goswami, Subhasish Banerjee and Chandan T Bhunia (pp. 61-70).
    • An Efficient Cloud-Assisted Message Authentication Scheme in Wireless Body Area Network, Huaijin Liu and Yonghong Chen (pp. 71-80).
    • Automatic Extract Clone Genealogy to Analysis Software Evolution Process, Chen Zhuo, Zhang Li-ping and Hou Min (pp. 81-94).
    • Securing the Security System, Sabah Al-Fedaghi (pp. 95-108).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA