Skip to content
NADIA

IJSIA Vol. 6, No. 3, 2012

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2012
2012
Volume 6, Number 3, 2012 July
    • The Difference of Awareness between Public Institutions and Private Enterprises for Cloud Computing Security, Junseok Oh, Young Bae Yoon, Jong Ryeol Suh and Bong Gyou Lee (pp. 1-10).
    • Online Social Media Networking and Assessing Its Security Risks, Hak J. Kim (pp. 11-18).
    • Performance Comparison of Identity Based Encryption and Identity Based Signature, Arjun Kumar and HoonJae Lee (pp. 19-28).
    • CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone, Seung Wook Jung (pp. 29-36).
    • Privacy-Enhanced Secure Data Transaction System for Smart Grid, Woong Go and Jin Kwak (pp. 37-44).
    • Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks, Jun-Sub Kim and Jin Kwak (pp. 45-54).
    • Arm’s Flex when Responding Call for Implicit User Authentication in Smartphone, Ali Fahmi Perwira Negara, Elyor Kodirov, Mohd Fikri Azli Abdullah, Deok-Jai Choi, Guee-Sang Lee and Shohel Sayeed (pp. 55-64).
    • Proposal to Adapt Reliability of National PKI to Grid Security Infrastructure by Credential Translation and Delegation with OAuth, Daeyoung Heo and Suntae Hwang (pp. 65-74).
    • Secure Index Management Scheme on Cloud Storage Environment, Sun-Ho Lee and Im-Yeong Lee (pp. 75-82).
    • Cyber Forensic for Hadoop based Cloud System, ChaeHo Cho, SungHo Chin and Kwang Sik Chung (pp. 83-90).
    • Privacy Level Indicating Data Leakage Prevention System, Jinhyung Kim, Jun Hwang and Hyung-Jong Kim (pp. 91-96).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA