Skip to content
NADIA

IJSIA Vol. 2, No. 3, 2008

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2008
2008
Volume 2, Number 3, 2008 July
    • An Intrusion Detection System in Mobile ADHOC Networks, S.Madhavi, Tai Hoon Kim (pp. 1-16).
    • IDEA: A New Intrusion Detection Data Source, William Mahoney, William Sousan (pp. 17-24).
    • A Unified Threat Model for Assessing Threat in Web Applications, Xiaohong Li and Ke He (pp. 25-30).
    • Cryptographic Key Management for SCADA Systems, Issues and Perspectives, Ludovic Piètre-Cambacédès, Pascal Sitbon (pp. 31-40).
    • Incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques, Ruo Ando, Youki Kadobayashi, Youichi Shinoda (pp. 41-48).
    • A Rapid and Efficient Pre-deployment Key Scheme for Secure Data Transmissions in Sensor Networks Using Lagrange Interpolation Polynomial, Hua-Yi Lin, De-Jun Pan, Xin-Xiang Zhao, Zhi-Ren Qiu (pp. 49-56).
    • A New Kind of Secure Electronic Communication Technology — VT Position Code Communication Technology and Its Implementation, Shi-Ying Zhou, Gui-He Qin, Yang Xun, Yu-Bo Jin (pp. 57-72).
    • Improvement of a Fingerprint-Based Remote User Authentication Scheme, Jing Xu, Wen-Tao Zhu, Deng-Guo Feng (pp. 73-80).
    • Fine Granularity Access Rights for Information Flow Control in Object Oriented Systems, Allaoua Maamir, Abdelaziz Fellah, Lina A. Salem (pp. 81-92).
    • Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege, Gaoshou Zhai, Jie Zeng, Miaoxia Ma, Liang Zhang (pp. 93-100).
    • The Economics of Privacy: People, Policy and Technology, Justin Zhan and Vaidyanathan Rajamani (pp. 101-108).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA