2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2012 2012 Volume 6, Number 2, 2012 April A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography, Gandharba Swain and Saroj Kumar Lenka (pp. 1-12). An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls, Razieh Sheikhpour and Nasser Modiri (pp. 13-28). Distributed Computation of SBoxes with Strong Security Properties, Panayotis E. Nastou and Yannis C. Stamatiou (pp. 29-46). Face Features Based Biometric Watermarking of Digital Image Using Singular Value Decomposition for Fingerprinting, Vandana S Inamdar and Priti P Rege (pp. 47-60). A Privacy-Protecting Architecture for Recommendation Systems via the Suppression of Ratings, Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné (pp. 61-80). LSMPMON: Performance Evaluation Mechanism of LSM-based Secure OS, Toshihiro Yamauchi and Kenji Yamamoto (pp. 81-90). A Communication Protocol of RFID Systems in Internet of Things, HuiDan Gao,YaJun Guo, JianQun Cui, HengGeng Hao and Hui Shi (pp. 91-102). Cryptanalysis of Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption, Gu Chun-sheng and Gu Ji-xing (pp. 103-108). An Architecture of Document Control System for Blocking Information Leakage in Military Information System, Jung ho Eom, Nam uk Kim, Sung hwan Kim and Tai Myoung Chung (pp. 109-114). Distributed Group Key Management in Wireless Mesh Networks, Peng Xiao, Jingsha He and Yingfang Fu (pp. 115-120). Human Face Recognition Based on Improved D-LDA and Integrated BPNNs Algorithms, Wenkai Xu and Eung-Joo Lee (pp. 121-126). An Enhanced Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards, Wen-Chung Kuo, Kai Chain, Jiin-Chiou Cheng and Jar-Ferr Yang (pp. 127-132). Improving the Security Level in Direct Sequence Spread Spectrum using Dual Codes (DC-DSSS), Rahat Ullah and Shahid Latif (pp. 133-136). Security Test Methodology for an Agent of a Mobile Device, Keunwoo Rhee, Hawon Kim and Hac Yun Na (pp. 137-142). Efficient Password-based Two Factors Authentication in Cloud Computing, Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang and Deqing Zou (pp. 143-148). Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi-hop Tactical Networks, Kwangsung Ju and Kwangsue Chung (pp. 149-154). A Study on Biometric Standards for Adaptation of the National Infrastructure, Yong-Nyuo Shin, Dong-Kyun Lim and Seung-Jung Shin (pp. 155-160). Watermarking for Multi-resolution Image Authentication, Piyu Tsai, Yu-Chen Hu, Hsiu-Lien Yeh and Wei-Kuan Shih (pp. 161-166). Immune Computation of Secure Embedded Linux Core against Viruses and Software Faults, Tao Gong and Changxing Du (pp. 167-172). Data Hiding on Text Using Big-5 Code, Jun-Chou Chuang and Yu-Chen Hu (pp. 173-178). An Efficient Black Hole Detection Method using an Encrypted Verification Message in Mobile Ad Hoc Networks, Firoz Ahmed, Seok Hoon Yoon and Hoon Oh (pp. 179-184). Minimal Information Loss for Privacy-Preserved eHealth Applications, Ya-Ling Chen, Bo-Chao Cheng, Hsueh-lin Chen, Chia-I Lin, Guo-Tan Liao, Bo-Yu Hou and Shih-Chun Hsu (pp. 185-190). SQL Injection Detection with Composite Kernel in Support Vector Machine, Yi Wang and Zhoujun Li (pp. 191-196). Histogram Rotation-Based Image Watermarking with Reversibility, Youngseok Lee and Jongweon Kim (pp. 197-202). An Improved Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment, Cheng-Chi Lee, Yan-Ming Lai and Chun-Ta Li (pp. 203-210). A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment, Juhyun Park, Jeonghun Choi, Myoungheum Park, Sukwon Hong and Hyomin Kim (pp. 211-216). Geometrically Invariant Image Watermarking Based on Feature Extraction and Zernike Transform, Xiao-Chen Yuan and Chi-Man Pun (pp. 217-222). Parallelization of Two Arithmetic Operations over Finite Field GF(2n), Yongnan Li and Limin Xiao (pp. 223-228). Automatic Analysis Method for SELinux Security Policy, Gaoshou Zhai and Tong Wu (pp. 229-234). A TWS3CDM based Marking Policy in DiffServ Networks, Byun-Gon Kim , Kwan-Woong Kim, Tae-Su Jang and Yong-Kab Kim (pp. 235-240). A Cloud-aided RSA Signature Scheme for Sealing and Storing the Digital Evidences in Computer Forensics, Chu-Hsing Lin, Chen-Yu Lee and Tang-Wei Wu (pp. 241-244). Implement Access Control Architecture to Enhance Security and Availability of Cloud Computing Systems, Xixu Fu, Kaijun Wu and XiZhang Gong (pp. 245-250). Development of FBG Sensor for Structure Deformation Measurement, Hyuntae Kim, Yumi Kim, Jingyu Do, Jangsik Park and Yunsik Yu (pp. 251-256). Secure File Delete in NAND-based Storage, Ilhoon Shin (pp. 257-260). Two-Factor User Authentication in Multi-Server Networks, Chun-Ta Li, Chi-Yao Weng and Chun-I Fan (pp. 261-268). An Improved MITM Attack Against NTRU, Zhijian Xiong, Jinshuang Wang, Yanbo Wang, Tao Zhang and Liang Chen (pp. 269-274). OPC Unified Architecture for Industrial Demand Response, Jian-ping Chou, Li-chao Chen, YingJun Zhang and Li-hu Pan (pp. 275-280). A Improved Channel Access Algorithm for IEEE 802.15.4 WPAN, Hyeopgeon Lee, Aran Kim, Kyounghwa Lee and Yongtae Shin (pp. 281-286). Collapse by Cascading Failures in Hybrid Attacked Regional Internet, Ye Xu and Zhuo Wang (pp. 287-292). High-precision Immune Computation for Secure Face Recognition, Tao Gong (pp. 293-298). A Secure Sharing Mechanism for Data Resources in Extended Virtual Machine System, Yunfa Li, Jian Wan, Rong Ouyang, Wei Zhang and Wanqing Li (pp. 299-306). Negative Authorization in Access Control for Cloud Computing, Xiaohui Li, Jingsha He and Ting Zhang (pp. 307-312). A Defeasible Description Logic Based Semantic Security Policy Conflict Detection Approach, Luokai Hu, Changchun Qiu and Yuda Shi (pp. 313-320). Optimized Discriminant Locality Preserving Projection of Gabor Feature for Biometric Recognition, Xi Chen and Jiashu Zhang (pp. 321-328). A Reputation Evaluation Technique for Web Services, Nianhua Yang, Xin Chen and Huiqun Yu (pp. 329-334). Secure ebXML Business Transaction Models Applying Web Service Security Standards, Dongkyoo Shin and Dongil Shin (pp. 335-340). A Semantic Rule-based Detection Scheme against Flooding Attacks on Cloud Environment, Chu-Hsing Lin, Chen-Yu Lee, Shin-Pin Lai and Wei-Shen Lai (pp. 341-346). Performance Analysis of Graph Laplacian Matrices in Detecting Protein Complexes, Dong Yun-yuan, Keith C.C. Chan, Liu Qi-jun and Wang Zheng-hua (pp. 347-352). Security Requirements of a Mobile Device Management System, Keunwoo Rhee, Woongryul Jeon and Dongho Won (pp. 353-358). An Action Based Access Control Model for Multi-level Security, Mang Su, Fenghua Li, Guozhen Shi and Li Li (pp. 359-366). The Design and Analysis of a Hardware-based Anomaly Detection Scheme, JinLong Piao and Seong Baeg Kim (pp. 367-372). A Novel Approach for SMS Security, Jongseok Choi and Howon Kim (pp. 373-378). An Efficient Wrapper-based Digital Rights Management, Wei-Chen Wu, Horng-Twu Liaw (pp. 379-384). Intrusion Trace Classification using Inter-element Dependency Models with k-Truncated Generalized Suffix Tree, Dae-Ki Kang and Pilsung Kang (pp. 385-390). Voucher Web Metering Using Identity Management Systems, Fahad Alarifi (pp. 391-396). Equivalent Key Recovery Attack to H2-MAC, Fahad Alarifi (pp. 397-402). A Novel Nonlinear Network Coding Signature Scheme Determined by the SIS problem, Yanqing Yao, Zhoujun Li and Hua Guo (pp. 403-408). SPA: Self-certified PKC-based Privacy-preserving Authentication Protocol for Vehicular Ad Hoc Networks, Jianhong Zhang, Yuanbo Cui, Zhipeng Chen (pp. 409-414). Efficient Virtual Machine Scheduling Exploiting VCPU Characteristics, Byung Ki Kim, Jin Kim and Young Woong Ko (pp. 415-420). Efficient Data Deduplication System Considering File Modification Pattern, Ho Min Jung, Sang Yong Park, Jeong Gun Lee and Young Woong Ko (pp. 421-426). Analysis of Urban Transit Environment for Video Analytics Application and Processing Scenarios, Kwang-Young Park and Goo-Man Park (pp. 427-430). Information Hiding Scheme with Reversibility Using Difference Segmentation and Histogram Adjustment, Yung-Chen Chou, Chun-Yi Huang and Yu-Chen Hu (pp. 431-436). Integrated Surveillance System and Field Test in Urban Transit System, Kwang-Young Park, Ji-Hye Jeon and Goo-Man Park (pp. 437-442). Model-driven Secure Development Lifecycle, Zhendong Ma, Christian Wagner, Arndt Bonitz, Thomas Bleier, Robert Woitsch and Markus Nichterl (pp. 443-448). Evaluation of Time Complexity Based on Max Average Distance for K-Means Clustering, ShinWon Lee and WonHee Lee (pp. 449-454). Construct a New ELGamal-type Public Key Cryptography over Finite Field, Zheng-jun Jing, Guo-ping Jiang and Chun-sheng Gu (pp. 455-462). The Characteristics of Smartwork Security Compare to Traditional Telework, Young-Jin Choi, JongHei Ra, DongIk Shin and Yong-Gyu Jung (pp. 463-468). Hidden Attribute Certificate-based Encryption Extensions Model, Li Yu, Zhao Yong, Gong Bei and Xin Si-yuan (pp. 469-474).