2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2013 2013 Volume 7, Number 4, 2013 July An Efficient User Authentication Scheme with Smart Cards for Wireless Communications, Woongryul Jeon, Yunho Lee and Dongho Won (pp. 1-16). Complete Fair Tracing E-cash System with Provable Security, Bin Lian, Gongliang Chen and Jianhua Li (pp. 17-36). RFID Mutual Authentication Protocol based on Synchronized Secret, Hyunsung Kim (pp. 37-50). 3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks, Jongpil Jeong, Min Kang, Younghwa Cho and Jaeyoung Choi (pp. 51-70). Provably Lightweight RFID Mutual Authentication Protocol, Rima Hussin Embrak Alakrut, Azman Samsudin and Alfin Syafalni (pp. 71-90). Research on Secure Corporate Investment against Inflation Impact, Ming Zhang and Tao Gong (pp. 91-96). Implementation of Management System to Ensure Self-imposed Control for the Personally Identifiable Information, Yong-Nyuo Shin (pp. 97-104). A Novel Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards, Chengbo Xu, Zhongtian Jia, Fengtong Wen and Yan Ma (pp. 105-118). Improvements of a Remote User Password Authentication Scheme using Smart Card, Kwang Cheul Shin and Won Whoi Huh (pp. 119-126). Enhanced Security of Rijndael Algorithm using Two Secret Keys, Ibtihal Mohamed Abdullateef Fadul and Tariq Mohamed Hassan Ahmed (pp. 127-134). Automatic Tracking of Bandpass Sampling OFDM Signals in Mobile Environment for Enhanced Security Communication, Xin Wang and Heung-Gyoon Ryu (pp. 135-144). A Robust Video Watermarking Algorithm for Content Authentication using Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD), Loganathan Agilandeeswari and Kumaravel Muralibabu (pp. 145-158). RAMS Analysis of Hybrid Redundancy System of Subsea Blowout Preventer Based on Stochastic Petri Nets, Zengkai Liu, Yonghong Liu, Baoping Cai, Xi Liu, Ju Li, Xiaojie Tian and Renjie Ji (pp. 159-166). A Study on the Ubiquitous e-Voting System for the Implementation of e-Government, Choong Sik Kim, Chang Duk Jung, Seo Yeong Ha and Chan Hyuk Park (pp. 167-176). WS Security of XBRL Financial Documents Encoded by SOAP, Il-Sun Park and Seung-Jung Shin (pp. 177-184). Application of Dominating Sets in Wireless Sensor Networks, Amir Hassani Karbasi and Reza Ebrahimi Atani (pp. 185-202). Visualization of Social Relationship for Analyzing NFC User Regarding SNS, Sun Park, DaeKyu Kim and ByungRae Cha (pp. 203-210). New Construction of Efficient Hierarchical Identity Based Signature in the Standard Model, He Liu, Sijia Wang and Mangui Liang (pp. 211-222). An Efficient Knowledge Base Management Scheme for Context Aware Surveillance, Soomi Yang (pp. 223-230). PUF Evaluation with Post-processing and Modified Modeling Attack, Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh and Keiichi Iwamura (pp. 231-242). Risk Assessment and Classification of Focusing SLA Requirement in Cloud Computing, Yasheng Pang, You Jin Song, Jang Mook Kang and Jae-Kwan Yun (pp. 243-256). P2P Link Buffering Control with Fault-recovery on Digital Yarn, Tae-Gyu Lee, Gi-Soo Chung, Seong-Hoon Lee and Young-Hun Lee (pp. 257-266). Study of Virus Propagation Model in Cloud Environment, Tongrang Fan, Yanjing Li and Feng Gao (pp. 267-276). Android-based Human Action Recognition Alarm Service using Action Recognition Parameter and Decision Tree, Nae-Joung Kwak and Teuk-Seob Song (pp. 277-286). A Research on Security and Privacy Issues for Patient related Data in Medical Organization System, Jin Wang, Zhongqi Zhang, Kaijie Xu, Yue Yin and Ping Guo (pp. 287-298). EPSDA: Energy Efficient Privacy preserving Secure Data Aggregation for Wireless Sensor Networks, Joyce Jose, M Princy and Josna Jose (pp. 299-316). Security Requirements of Web Content Protection System, Hyun-Jung Lee and Dongho Won (pp. 317-326). Reliability and Security Analysis on 3-vote-2 Voting System, Hongsheng Su (pp. 327-342). New Minutiae Detection Algorithm from Fingerprint Image using the Improved Tracing on Ridge Curve, Sung-Woo Han, Dae-Seong Jeoune and Young-Woo Yoon (pp. 343-352). On the Entropy Bounds for Collision Statistic”, Ju-Sung Kang, Yongjin Yeom, and Okyeon Yi (pp. 353-362). A Vision-Based Hybrid Method for Eye Detection and Tracking, Kun Mu (pp. 363-374). On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus, Imran Edzereiq Kamarudin, Syahrizal Azmir Md Sharif and Tutut Herawan (pp. 375-386). Steganography in HTML Based on Substitution of Script Codes, Fei Wang, Liusheng Huang, Haibo Miao, Zhili Chen and Wei Yang (pp. 387-398). Implementation of an Identification System Using Iris Recognition, Woo Suk Yang (pp. 399-406). Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks, Xingming Sun, Jianwei Su, Baowei Wang and Qi Liu (pp. 407-416). Structural and Running Safety Assessment of the Handling and Distributing System in Automated Container Terminal Considering Container Vehicle-Truss Bridge Coupled Vibration, Lu Kai-liang, Yan Wei, Ye Hao, Bao Yan and Liu Xiang-rui (pp. 417-432). Security Scheme for High Capacity USIM-based Services, Eun Su Jeong, Bum Han Kim and Dong Hoon Lee (pp. 433-444). New Entropy Source for Cryptographic Modules Using OpenMP in Multicore CPUs, Jungbai Kim, Taeill Yoo, Yongjin Yeom and Okyeon Yi (pp. 445-452). Robust Text Image Watermarking Algorithm Based on Odd-even Quantization, Mo You, De Li and JongWeon Kim (pp. 453-464).