2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2013 2013 Volume 7, Number 3, 2013 May A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET, ByungKwan Lee, EunHee Jeong and Ina Jung (pp. 1-10). Probability-based Tamper Detection Scheme for BTC-compressed Images Based on Quantization Levels Modification, Yu-Chen Hu, Chun-Chi Lo, Chang-Ming Wu, Wu-Lin Chen and Chia-Hsien Wen (pp. 11-32). Multibiometrics Fusion for Identity Authentication: Dual Iris, Visible and Thermal Face Imagery, Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng and Xiamu Niu (pp. 33-44). Substitutive Mutual Authentication between Mobile Base Stations in Tactical Networks, Yu-Jin Son, Taeshik Shon and Young-Bae Ko (pp. 45-54). Secure Cryptographic Scheme based on Modified Reed Muller Codes, Cheikh Thiecoumba Gueye and EL. Hadji Modou Mboup (pp. 55-64). A Multimodal Fusion Algorithm Based on FRR and FAR Using SVM, Yong Li, Meimei Shi, En Zhu, Jianping Yin, Jianmin Zhao (pp. 65-74). Single Sign-On Scheme using XML for Multimedia Device Control in Children’s Game Network based on OSGi service Platform, Dongkyoo Shin and Dongil Shin (pp. 75-84). Toward Trust-based Privacy Protection in Consumer Communication, Fei Xu, Jingsha He, Jing Xu and Yuqiang Zhang (pp. 85-98). Applying Basic-Elements and the Extension Theory to Alert-centric Event Correlation for Unified Network Security Management, Hui Xu, Chunzhi Wang, Hongwei Chen and Zhiwei Ye (pp. 99-110). Enhanced Security Communication System Using Digital Retrodirective Array Antenna, Junyeong Bok and Heung-Gyoon Ryu (pp. 111-120). Safety Properties based Scenario Generation for Model Checking Trampoline OS, Nahida Sultana Chowdhury and Yunja Choi (pp. 121-132). The Firewall Rule Authentication Method Based on 6to4 Tunnel, Li Zhou, Liangyi Gong and Xin Zou (pp. 133-142). An Improved Secure Dynamic ID-based Remote User Authentication Scheme with Key Agreement using Symmetric Cryptology, Mijin Kim, Junghyun Nam and Dongho Won (pp. 143-152). A Method of Threat Evaluation for Mobile Network, Wang Bailing, Li Shang, Qu Yun, Wang Xiaopeng and Liu Yang (pp. 153-162). A Watermarking for HTML Files Based on Multi-channel System, Yung-Chen Chou, Iuon-Chang Lin and Ping-Kun Hsu (pp. 163-174). Wireless Structural Health Monitoring System Using ZigBee Network and FBG Sensor, Hyuntae Kim, Jingyu Do and Jangsik Park (pp. 175-182). Hash-based RFID Mutual Authentication Protocol, Liu Yang, Peng Yu, Wang Bailing, Qu Yun, Bai Xuefeng, Yuan Xinling and Yin Zelong (pp. 183-194). Design and Implementation of a Network Attack Platform Based on Plug-in Technology, Li Gen, Wang Bailing, Liu Yang, Bai Xuefeng and Yuan Xinling (pp. 195-204). The Methodology of Security Management Cost Reduction using Security Level Lifecycle, Sung-Hwan Kim, Jung-Ho Eom and Tai-Myoung Chung (pp. 205-214). File Multi-analyses for Real-time Attack Source and Spread Site Trace, DaeHee Seo, SangWoo Lee, ByungDoo Kim, ByungGil Lee and JangMi Baek (pp. 215-222). FHGM: A Frequency Hopping Game Model with Communication Security Awareness for WSN, Chunlai Du, Jixiang Zhang, Jianshun Zhang, Li Ma and Xianxian Wang (pp. 223-234). Integrating Security Concerns into Software Development, Sabah Al-Fedaghi and Fajer Al-Kanderi (pp. 235-248). Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks, Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee and Chin-Wen Lee (pp. 249-258). Can Friendship Be Counted on for Securing Wireless Ad Hoc Networks?, Lianggui Liu, Huiling Jia and Ting Shu (pp. 259-270). An Improvement of Sood, et al.’s Authentication Scheme using Smart Card, Kwang Cheul Shin and Jung Gil Cho (pp. 271-282). Research On Efficient Turbo Frequency Domain Equalization In STBC-MIMO System, Huang Wanqiu (pp. 283-292). An Innovative Two Factor Authentication Method: The QRLogin System, Soonduck Yoo, Seung-jung Shin and Dae-hyun Ryu (pp. 293-302). Analysis of Hash Functions and Cellular Automata Based Schemes, Jun-Cheol Jeon (pp. 303-316). A Robust Trust Management Scheme against the Malicious Nodes in Distributed P2P Network, Do-sik An, Byong-lae Ha and Gi-hwan Cho (pp. 317-326). A Secure Real Media Contents Management Model Based on Archetypes using Cloud Computing, You-Jin Song, Jang-Mook Kang and Jaedoo Huh (pp. 327-336). Security Augmenting Scheme for Bus Information System based on Smart Phone, Seungcheon Kim (pp. 337-346). Security in Graphical Authentication, Robert G. Rittenhouse, Junaid Ahsenali Chaudry and Malrey Lee (pp. 347-356). Eliminate Evading Analysis Tricks in Malware using Dynamic Slicing, Peidai Xie, Xicheng Lu, Yongjun Wang and Jinshu Su (pp. 357-366). Robust Video Watermarking Based on Temporal Modulation with Error Correcting Code, Sang-Woo Lee, Byung-Gil Lee and Dae-Hee Seo (pp. 367-376). Random Selection of Multiple Spreading Codes Enhances the Security of DSSS Transmission (RSMC-DSSS), Shahid Latif and Rahat Ullah (pp. 377-386). Page Mapping Scheme to Support Secure File Deletion for NAND-based Block Devices, Ilhoon Shin (pp. 387-394). Text Clustering using Semantic Features for Utilizing NFC Access Information, Sun Park, DaeKyu Kim and ByungRae Cha (pp. 395-404). A Comparative Study on Tangerine Detection, Counting and Yield Estimation Algorithm, Ulzii-Orshikh Dorj, Malrey Lee and Sangsub Han (pp. 405-412). Fault Localization Method of Software Defects based on Dependencies Analysis of Program Structure, Hui He, Lei Zhao, Qiao Li, Weizhe Zhang, Dongmin Gao and Yongtan Liu (pp. 413-422).