Skip to content
NADIA

IJSIA Vol. 5, No. 4, 2011

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2011
2011
Volume 5, Number 4, 2011 October
    • A Novel Mutual Authentication Scheme Based on Fingerprint Biometric and Nonce Using Smart Cards, De-song Wang, Jian-ping Li (pp. 1-12).
    • Implementation of a Police Intelligence Analysis Framework, Dafni Stampouli, Matthew Roberts, Gavin Powell, Tomás Sánchez López (pp. 13-22).
    • Detecting JFIF Header using FORHEADER, Kamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris (pp. 23-36).
    • Witness Interviews: Does recall of relational information improve identifiability of a facial composite?, Faye Skelton, Charlie Frowd, Sally Andrews (pp. 37-48).
    • Secret Key Awareness Security Public Key Encryption Scheme, Guoyan Zhang and Qiuliang Xu (pp. 49-58).
    • The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review, Soltan Alharbi, Jens Weber-Jahnke, Issa Traore (pp. 59-72).
    • Framework and Models for Multistep Attack Detection, Mirco Marchetti, Michele Colajanni, Fabio Manganiello (pp. 73-90).
    • Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis, Lukáš Ďurfina, Jakub Křoustek, Petr Zemek, Dušan Kolář, Tomáš Hruška, Karel Masařík, and Alexander Meduna (pp. 91-106).
    • 2SC: an Efficient Code-based Stream Cipher, Mohammed Meziani, Pierre-Louis Cayrel, and Sidi Mohamed El Yousfi Alaoui (pp. 107-116).
    • A Password Attack on S-3 PAKE, R. Padmavathy (pp. 117-122).
    • GPU Implementation of the Keccak Hash Function Family, Pierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider (pp. 123-132).
    • Recent progress in code-based cryptography, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani and Robert Niebuhr (pp. 133-144).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA