Skip to content
NADIA

IJSIA Vol. 2, No. 4, 2008

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2008
2008
Volume 2, Number 4, 2008 October
    • Intelligent Techniques for Effective Network Protocol Security Monitoring, Measurement and Prediction, Emmanuel Hooper (pp. 1-10).
    • Some limits of Common Criteria certification, Dusart Pierre, Sauveron Damien, Tai-Hoon Kim (pp. 11-20).
    • Investigation of Secure Framework for Multipath MANET, Binod Vaidya,Dong-You Choi, JongAn Park, SeungJo Han (pp. 21-28).
    • Liveness Detection for Biometric Systems Based on Papillary Lines, Martin Drahansky, Dana Lodrova (pp. 29-38).
    • Implicit Detection of Hidden Processes with a Local-Booted Virtual Machine, Yan Wen, Jinjing Zhao, Huaimin Wang (pp. 39-48).
    • A Web Metering Scheme for Fair Advertisement Transactions, Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei (pp. 49-56).
    • Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol, Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, Tatsuo Nakajima (pp. 57-66).
    • Incorporating Security Requirements Engineering into Standard Lifecycle Processes, Nancy R. Mead, Venkatesh Viswanathan, Justin Zhan (pp. 67-80).
    • Why MSN Lost to QQ in China Market?-Different Privacy Protection Design, Zhaoli Meng, Meiyun Zuo (pp. 81-88).
    • Anomaly Detection Using LibSVM Training Tools, Jung-Chun Liu, Chu-Hsing Lin, Jui-Ling Yu, Wei-Shen Lai, Chia-Han Ho (pp. 89-98).
    • Analysis of some Famous Cryptographic Protocols Using the Interpretation-Function-based Method, Hanane Houmani Mohamed Mejr (pp. 99-116).
    • Performance Analysis of an Authentication Scheme for Personalized Mobile Multimedia applications: A Cognitive Agents based Approach, B. Sathish Babu and Pallapa Venkataram (pp. 117-140).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA