Skip to content
NADIA

IJSIA Vol. 7, No. 6, 2013

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2013
2013
Volume 7, Number 6, 2013 November
    • An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks, Firoz Ahmed, Hoon Oh (pp. 1-10).
    • Designated-Verifier Provable Data Possession in Public Cloud Storage, Yongjun Ren, Jiang Xu, Jin Wang, Jeong-Uk Ki (pp. 11-20).
    • A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services, Changsoo Lee, Daewon Jung, Keunwang Lee (pp. 21-30).
    • A Research on Security Awareness and Countermeasures for the Single Server, Hyuk-Jin Son, Seungdo Jeong (pp. 31-42).
    • A High Speed Block Cipher Algorithm, Bac Do Thi, Minh Nguyen Hieu (pp. 43-54).
    • Remote Viewing Image Mosaic based on Fuzzy Cellular Automata Corner Detection in Substation, Li Jing (pp. 55-66).
    • Data Security Monitoring Platform in Cloud for Enterprise, Geng Yushui and Pang Shunpeng (pp. 67-78).
    • Streaming Video Service Model using Secure Steganographic Method, Yunjung Lee (pp. 79-88).
    • Context-Aware Information-Based Access Restriction Scheme for Cloud Data, Seul-Ki Choi, Jin Kwak (pp. 89-96).
    • Research of Data Security Model in Cloud Computing Platform for SMEs, Tao Sun, Xinjun Wang (pp. 97-108).
    • A Method for Individualized Privacy Preservation, Song Yang, Li Lijie, Zhang Jianpei, Yang Jing (pp. 109-116).
    • Research of Methods of Theory and Application about Moving Object Detection, Yong Qin, Junhua Han, Meng Wei, Hao Luo, Wenting Fan (pp. 117-126).
    • A Novel Card-based Information Security Game Development on SNS, Woo-Taek Lim, Moon-Bo Yang, Seong Baeg Kim (pp. 127-136).
    • Development of Information Security Contents for Learning Hacking Principles, Ji Yeon Hong, Ik Jun Kang, Seong Baeg Kim, Chan Jung Park (pp. 137-146).
    • Research on the Crash Safety of the Car Bumper Base on the Different Standards, Q. H. Ma, C. Y. Zhang, S. Y. Han, Z. T. Qin (pp. 147-154).
    • Enhanced Smartcard based Multi-Server Authentication Scheme, Hee-Joo Park, Chonggun Kim (pp. 155-164).
    • Study on an Algorithm for Generating the Multiple Watermark Information using 2D Barcode, Jizhe Cui, Jongweon Kim (pp. 165-172).
    • Design and Implementation of Underground Mining Safety Production Management System, Jun Luo (pp. 173-180).
    • Improving Mobile Device Classification using Security Events for Preventing Wireless Intrusion, Hyeokchan Kwon, Sin-Hyo Kim (pp. 181-190).
    • Piracy Tracking System of the BitTorrent, Jungjae Lee, Jongweon Kim (pp. 191-198).
    • Research on an Authentication Algorithm for an Electronic Attendance System in the Constructing of a Smart Campus, Jin Kim, Seung-Kook Cheong (pp. 199-208).
    • Grayscale Image Tamper Detection and Recovery Based on Vector Quantization, Jun-Chou Chuang, Yu-Chen Hu, Chun-Chi Lo, Wu-Lin Chen (pp. 209-228).
    • Design and Analysis of Fast Image Encryption Algorithm based on Multiple Chaotic Systems in Real-time Security Car, Shuai Wang, Wei Sun, Yinan Guo, Haiqun Yang, Shuming Jiang (pp. 229-240).
    • A Secure and Efficient Vehicle-to-Vehicle Communication based on Sensor Network, Su-Hyun Kim and Im-Yeong Lee (pp. 241-248).
    • Analysis on the Attribute Binding based Enhanced User Authentication, Tae Kyung Kim, Jae Hoon Nah (pp. 249-258).
    • Research on Data and Transaction Security of Enterprise E-Commerce Countermeasure, Yongyong Zhu (pp. 259-268).
    • Some Explicit Formulae of NAF and its Left-to-Right, Dong-Guk Han, Okyeon Yi y, and Tsuyoshi Takagi (pp. 269-274).
    • Analysis on Fraud Detection for Internet Service, Tae Kyung Kim, Hyung Jin Lim, Jae Hoon Nah (pp. 275-284).
    • Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values, Gandharba Swain (pp. 285-294).
    • An application of KPCA and SVM in the human face recognition, Feng Yue, Meng Qing Song, Yuan Hai Bo (pp. 295-302).
    • Optimization of Face Recognition Algorithms for Smartphone Environment, Kanghun Jeong, Dongil Han and Hyeonjoon Moon (pp. 303-308).
    • A Formally Verified Protocol for Secure Vertical Handovers in 4G Heterogeneous Networks, Naïm Qachri, Olivier Markowitch, Jean-Michel Dricot (pp. 309-326).
    • A Study on User Access Control Method using Multi-Factor Authentication for EDMS, Keunwang Lee (pp. 327-334).
    • Cryptanalysis and Improvements of an Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks, Zuowen Tan (pp. 335-344).
    • Study of the Privacy Models in RFID Authentication Protocols, Jian Shen, Wenying Zheng, Jin Wang, Zhihua Xia, Zhangjie Fu (pp. 345-354).
    • Performance and Information Security Evaluation with Firewalls, Thaier Hayajneh, Bassam J. Mohd , Awni Itradat, and Ahmad Nahar Quttoum (pp. 355-372).
    • Protection Profile for Unidirectional Security Gateway between Networks, Hyun-Jung Lee, Dongho Won (pp. 373-384).
    • Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation, Yang Li, Jianming Zhu, Xiuli Wang, Yanmei Chai, Shuai Shao (pp. 385-394).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA