Skip to content
NADIA

IJSIA Vol. 7, No. 3, 2013

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2013
2013
Volume 7, Number 3, 2013 May
    • A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET, ByungKwan Lee, EunHee Jeong and Ina Jung (pp. 1-10).
    • Probability-based Tamper Detection Scheme for BTC-compressed Images Based on Quantization Levels Modification, Yu-Chen Hu, Chun-Chi Lo, Chang-Ming Wu, Wu-Lin Chen and Chia-Hsien Wen (pp. 11-32).
    • Multibiometrics Fusion for Identity Authentication: Dual Iris, Visible and Thermal Face Imagery, Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng and Xiamu Niu (pp. 33-44).
    • Substitutive Mutual Authentication between Mobile Base Stations in Tactical Networks, Yu-Jin Son, Taeshik Shon and Young-Bae Ko (pp. 45-54).
    • Secure Cryptographic Scheme based on Modified Reed Muller Codes, Cheikh Thiecoumba Gueye and EL. Hadji Modou Mboup (pp. 55-64).
    • A Multimodal Fusion Algorithm Based on FRR and FAR Using SVM, Yong Li, Meimei Shi, En Zhu, Jianping Yin, Jianmin Zhao (pp. 65-74).
    • Single Sign-On Scheme using XML for Multimedia Device Control in Children’s Game Network based on OSGi service Platform, Dongkyoo Shin and Dongil Shin (pp. 75-84).
    • Toward Trust-based Privacy Protection in Consumer Communication, Fei Xu, Jingsha He, Jing Xu and Yuqiang Zhang (pp. 85-98).
    • Applying Basic-Elements and the Extension Theory to Alert-centric Event Correlation for Unified Network Security Management, Hui Xu, Chunzhi Wang, Hongwei Chen and Zhiwei Ye (pp. 99-110).
    • Enhanced Security Communication System Using Digital Retrodirective Array Antenna, Junyeong Bok and Heung-Gyoon Ryu (pp. 111-120).
    • Safety Properties based Scenario Generation for Model Checking Trampoline OS, Nahida Sultana Chowdhury and Yunja Choi (pp. 121-132).
    • The Firewall Rule Authentication Method Based on 6to4 Tunnel, Li Zhou, Liangyi Gong and Xin Zou (pp. 133-142).
    • An Improved Secure Dynamic ID-based Remote User Authentication Scheme with Key Agreement using Symmetric Cryptology, Mijin Kim, Junghyun Nam and Dongho Won (pp. 143-152).
    • A Method of Threat Evaluation for Mobile Network, Wang Bailing, Li Shang, Qu Yun, Wang Xiaopeng and Liu Yang (pp. 153-162).
    • A Watermarking for HTML Files Based on Multi-channel System, Yung-Chen Chou, Iuon-Chang Lin and Ping-Kun Hsu (pp. 163-174).
    • Wireless Structural Health Monitoring System Using ZigBee Network and FBG Sensor, Hyuntae Kim, Jingyu Do and Jangsik Park (pp. 175-182).
    • Hash-based RFID Mutual Authentication Protocol, Liu Yang, Peng Yu, Wang Bailing, Qu Yun, Bai Xuefeng, Yuan Xinling and Yin Zelong (pp. 183-194).
    • Design and Implementation of a Network Attack Platform Based on Plug-in Technology, Li Gen, Wang Bailing, Liu Yang, Bai Xuefeng and Yuan Xinling (pp. 195-204).
    • The Methodology of Security Management Cost Reduction using Security Level Lifecycle, Sung-Hwan Kim, Jung-Ho Eom and Tai-Myoung Chung (pp. 205-214).
    • File Multi-analyses for Real-time Attack Source and Spread Site Trace, DaeHee Seo, SangWoo Lee, ByungDoo Kim, ByungGil Lee and JangMi Baek (pp. 215-222).
    • FHGM: A Frequency Hopping Game Model with Communication Security Awareness for WSN, Chunlai Du, Jixiang Zhang, Jianshun Zhang, Li Ma and Xianxian Wang (pp. 223-234).
    • Integrating Security Concerns into Software Development, Sabah Al-Fedaghi and Fajer Al-Kanderi (pp. 235-248).
    • Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks, Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee and Chin-Wen Lee (pp. 249-258).
    • Can Friendship Be Counted on for Securing Wireless Ad Hoc Networks?, Lianggui Liu, Huiling Jia and Ting Shu (pp. 259-270).
    • An Improvement of Sood, et al.’s Authentication Scheme using Smart Card, Kwang Cheul Shin and Jung Gil Cho (pp. 271-282).
    • Research On Efficient Turbo Frequency Domain Equalization In STBC-MIMO System, Huang Wanqiu (pp. 283-292).
    • An Innovative Two Factor Authentication Method: The QRLogin System, Soonduck Yoo, Seung-jung Shin and Dae-hyun Ryu (pp. 293-302).
    • Analysis of Hash Functions and Cellular Automata Based Schemes, Jun-Cheol Jeon (pp. 303-316).
    • A Robust Trust Management Scheme against the Malicious Nodes in Distributed P2P Network, Do-sik An, Byong-lae Ha and Gi-hwan Cho (pp. 317-326).
    • A Secure Real Media Contents Management Model Based on Archetypes using Cloud Computing, You-Jin Song, Jang-Mook Kang and Jaedoo Huh (pp. 327-336).
    • Security Augmenting Scheme for Bus Information System based on Smart Phone, Seungcheon Kim (pp. 337-346).
    • Security in Graphical Authentication, Robert G. Rittenhouse, Junaid Ahsenali Chaudry and Malrey Lee (pp. 347-356).
    • Eliminate Evading Analysis Tricks in Malware using Dynamic Slicing, Peidai Xie, Xicheng Lu, Yongjun Wang and Jinshu Su (pp. 357-366).
    • Robust Video Watermarking Based on Temporal Modulation with Error Correcting Code, Sang-Woo Lee, Byung-Gil Lee and Dae-Hee Seo (pp. 367-376).
    • Random Selection of Multiple Spreading Codes Enhances the Security of DSSS Transmission (RSMC-DSSS), Shahid Latif and Rahat Ullah (pp. 377-386).
    • Page Mapping Scheme to Support Secure File Deletion for NAND-based Block Devices, Ilhoon Shin (pp. 387-394).
    • Text Clustering using Semantic Features for Utilizing NFC Access Information, Sun Park, DaeKyu Kim and ByungRae Cha (pp. 395-404).
    • A Comparative Study on Tangerine Detection, Counting and Yield Estimation Algorithm, Ulzii-Orshikh Dorj, Malrey Lee and Sangsub Han (pp. 405-412).
    • Fault Localization Method of Software Defects based on Dependencies Analysis of Program Structure, Hui He, Lei Zhao, Qiao Li, Weizhe Zhang, Dongmin Gao and Yongtan Liu (pp. 413-422).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA