Skip to content
NADIA

IJSIA Vol. 6, No. 4, 2012

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2012
2012
Volume 6, Number 4, 2012 October
    • Multi-Layer Data Encryption Using Residue Number System in DNA Sequence, M. I. Youssef, A. Emam and M. Abd Elghany (pp. 1-12).
    • A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography, Gandharba Swain and Saroj Kumar Lenka (pp. 13-24).
    • Security Threats in Cloud Computing Environments, Kangchan Lee (pp. 25-32).
    • Analysis of Operator Errors in Routing Policy Configurations, Sihyung Lee (pp. 33-52).
    • Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies, Faisal Alkhateeb, Ahmed M. Manasrah and Abed Al Raoof Bsoul (pp. 53-66).
    • Enhancing Grid Security using Quantum Key Distribution, Muhammad Mubashir Khan and Jie Xu (pp. 67-76).
    • Integration of Sound Signature Authentication System, Bagrudeen Bazeer Ahamed and Shanmugasundaram Hariharan (pp. 77-86).
    • An Anti-Shoulder Surfing Mechanism and its Memorability Test, Lim Kah Seng, Norafida Ithnin and Hazinah Kutty Mammi (pp. 87-96).
    • Modeling the Forensics Process, Sabah Al-Fedaghi and Bashayer Al-Babtain (pp. 97-108).
    • Web Service Selection Using Quality Criteria and Trust Based Routing Protocol, Mahdi Bazarganigilani (pp. 109-118).
    • Design and Analysis of a Non-deterministic Digital Signature Protocol, Odule, Tola John and Olatubosun Abiodun Kaka (pp. 119-130).
    • The Risks Facing China’s Mining Companies – An Analysis from Global Perspective, Gu Chunyan (pp. 131-140).
    • An Improved Secure Anonymous Protocol for Distributed Computer Networks, Kai Chain, Wen-Chung Kuo and Jiin-Chiou Cheng (pp. 141-150).
    • Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version, Ting-Yi Chang, Chou-Chen Yang and Min-Shiang Hwang (pp. 151-162).
    • A Stronger Formal Security Model of Three-party Authentication and Key Distribution Protocol for 802.11i, Tao Wenjun and Hu Bin (pp. 163-174).
    • Modeling of Document Security Checkpoint for Preventing Leakage of Military Information, Jung ho Eom (pp. 175-182).
    • Homomorphic Encryption to Preserve Location Privacy, Maede Ashouri-Talouki and Ahmad Baraani-Dastjerdi (pp. 183-190).
    • Compliance Risk Assessment Measures of Financial Information Security using System Dynamics, Ae Chan Kim, Su Mi Lee and Dong Hoon Lee (pp. 191-200).
    • Design and Implementation of a Compiler with Secure Coding Rules for Secure Mobile Applications, Yunsik Son and Seman Oh (pp. 201-206).
    • Security Analysis of the Masking-Shuffling based Side Channel Attack Countermeasures, Jong-Won_Cho and Dong-Guk Han (pp. 207-214).
    • Design of User Information Profiling for Consolidated Authentication in N-Screen Environment, Jae-jung Kim, Seng-phil Hong, Yu-jin Shin, Hyun-mi Jang and Jaehyoun Kim (pp. 215-222).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA