Skip to content
NADIA

IJSIA Vol. 3, No. 1, 2009

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2009
2009
Volume 3, Number 1, 2009 January
    • A Novel Mobile Content Delivery Scenario with Simple Double-Key Secure Access Control, Chih-Lin Hu and Chien-An Cho (pp. 1-16).
    • Analysis of Security Policy in Practical Internet Coordinates, Xiaohan Zhao, Xiaoxiao Song, Xiao Wang, Yang Chen, Beixing Deng, Xing Li (pp. 17-30).
    • Detect SYN Flooding Attack in Edge Routers, Yun Ling, Ye Gu, Guiyi Wei (pp. 31-46).
    • k-anonymity Diagnosis Centre, Mohammad Reza Zare Mirakabad, Aman Jantan, Stéphane Bressan (pp. 47-64).
    • Where the POP Architecture Stands among the other RFID Solutions was recalled by author because authors found some critical problems, K.H.S Sabaragamu Koralalage (pp. 65-76).
    • Towards Reliable Trust Management based on Structural Trust Scopes of Distributed Roles, Gang Yin, Ning Zhou, Huaimin Wang (pp. 77-86).
    • Design of Multi-Service Smart Card Systems for High Security and Performance, Mei Hong, Hui Guo (pp. 87-100).
    • On Transiting Key in XML Data Transformation for Integration, Md. Sumon Shahriar and Jixue Liu (pp. 101-116).
    • Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes, Mehdi Kargar (pp. 117-128).
    • Person Identification through IRIS Recognition, Poulami Das, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-hoon Kim (pp. 129-148).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA