Skip to content
NADIA

IJSIA Vol. 8, No. 1, 2014

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2014
2014
Volume 8, Number 1, 2014 January
    • An Improved Reconstruction methods of Compressive Sensing Data Recovery in Wireless Sensor Networks, Sai Ji, Liping Huang, Jin Wang, Jian Shen and Jeong-Uk Kim (pp. 1-8).
    • Influence of HRM Practices on Privacy Policy Compliance Intention: A Study among Bank Employees in Korea, Youngkeun Choi and Taejong (pp. 9-18).
    • Modeling and Analysis of SMER Constraints Violation in IRBAC 2000 Model Based on Colored Petri Nets, Meng Liu and Xuan Wang (pp. 19-32).
    • Efficient Data Memory Usages of 3GPP Authentication and Key Agreement Protocol, Minha Park, Yeog Kim and Okyeon Yi (pp. 33-44).
    • A TPSAC Model and Its Application to Mechanical Cloud Simulation, Changyu Liu, Shoubin Dong, Huiling Li, Bin Lu and Alex Hauptmann (pp. 45-56).
    • An Improved Dominant Point Feature for Online Signature Verification, Darma Putra, Yogi Pratama, Oka Sudana and Adi Purnawan (pp. 57-70).
    • Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications, Kyung-Soo Joo and Jung-Woong Woo (pp. 71-80).
    • Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs, Sung-Woon Lee and Hyunsung Kim (pp. 81-92).
    • A Novel Approach to Design the Fast Pedestrian Detection for Video Surveillance System, Shuoping Wang, Zhike Han, Li Zhu and Qi Chen (pp. 93-102).
    • Securing E-Governance Services through Biometrics, Madhavi Gudavalli, D. Srinivasa Kumar and S. Viswanadha Raju (pp. 103-112).
    • A Study on the Integrated Security System based Real-time Network Packet Deep Inspection, Chang-Su Moon and Sun-Hyung Kim (pp. 113-122).
    • A Reliable File Protection System Based on Transparent Encryption, Jun Liu, ShuYu Chen, MingWei Lin and Han Liu (pp. 123-132).
    • Sensitive Semantics-Aware Personality Cloaking on Road-Network Environment, Min Li, Zhiguang Qin and Cong Wang (pp. 133-146).
    • Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography, Usha. S and Kuppuswami. S (pp. 147-158).
    • Towards an Efficient and Secure Online Digital Rights Management Scheme in Cloud Computing, Huang Qinlong, Ma Zhaofeng, Fu Jingyi, Yang Yixian and Niu Xinxin (pp. 159-168).
    • Security Assessment for Key Management in Mobile Ad Hoc Networks, Reham Abdellatif Abouhogail (pp. 169-182).
    • Evading Anti-debugging Techniques with Binary Substitution, JaeKeun Lee, BooJoong Kang and Eul Gyu Im (pp. 183-192).
    • Knowledge Based Secure Data Streaming in Virtual Environment, Anand R and S. Saraswathi (pp. 193-200).
    • A Study of Security Requirement Demand Survey Analysis on Manufacturing Industry, Hangbae Chang (pp. 201-212).
    • Fault Diagnosis Research of Submarine Casing Cutting Robot for Abandoned Oil Wellhead, Xiaojie Tian, Yonghong Liu, Yunwei Zhang, Rongju Lin and Yuanyuan Xi (pp. 213-224).
    • Study on Accurate Calculating the Risk of the SCADA, Young In You and Kyuong Ho Lee (pp. 225-230).
    • Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack, You Joung Ham, Daeyeol Moon, Hyung-Woo Lee, Jae Deok Lim and Jeong Nyeo Kim (pp. 231-246).
    • A survey of Cyber Attack Detection Strategies, Jamal Raiyn (pp. 247-256).
    • Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment, Sun-Ho Lee and Im-Yeong Lee (pp. 257-272).
    • Performance of Converged Secure Socket Layer and CMVP Cryptographic Modules, Okyeon Yi, Seunghwan Yun, Myungseo Park, Nuri Hwang, Taeyean Kwon and Chaewon Yun (pp. 273-282).
    • Crowdsourcing Fraud Detection Algorithm Based on Ebbinghaus Forgetting Curve, Li Peng, Yu Xiao-yang, Liu Yang and Zhang Ting-ting (pp. 283-290).
    • Risk Prediction of Malicious Code-Infected Websites by Mining Vulnerability Features, Taek Lee, Dohoon Kim, Hyunchoel Jeong and Hoh Peter In (pp. 291-294).
    • The Design and Implementation of Collaboration Service Integration Platform Based on Context-Aware Role Based Access Model, Shu-Ping Lu, Kuei-Kai Shao, Yu-Nung Chao, Kuo-Shu Luo and Chi-Hua Chen (pp. 295-306).
    • New Construction of Even-variable Rotation Symmetric Boolean Functions with Optimum Algebraic Immunity, Yindong Chen, Hongyan Xiang and Ya-nan Zhang (pp. 307-318).
    • Dynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data, Xingming Sun, Xinhui Wang, Zhihua Xia, Zhangjie Fu and Tao Li (pp. 319-332).
    • A Study on the Optimization Method for the Rule Checker in the Secure Coding, JaeHyun Kim and YangSun Lee (pp. 333-342).
    • Efficient Image Scrambling based on any Chaotic Map, Cao Guanghui, Hu Kai and Zhou Jun (pp. 343-354).
    • Comparison of Secure Development Frameworks for Korean e-Government Systems, Dongsu Seo (pp. 355-362).
    • Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis, Dongsu Seo (pp. 363-372).
    • Security Vulnerabilities Tests Generation from SysML and Event-B Models for EMV Cards, Noura Ouerdi, Mostafa Azizi, M’Hammed Ziane, Abdelmalek Azizi, Jean-louis Lanet and Aymerick Savary (pp. 373-388).
    • Lossless Data Hiding Technique using Reversible Function, Sang-Ho Shin and Jun-Cheol Jeon (pp. 389-400).
    • Sinkhole Vulnerabilities in Wireless Sensor Networks, Junaid Ahsenali Chaudhry, Usman Tariq, Mohammed Arif Amin and Robert G. Rittenhouse (pp. 401-410).
    • New Construction of Efficient Certificateless Aggregate Signatures, He Liu, Sijia Wang, Mangui Liang and Yongqian Chen (pp. 411-422).
    • How to Formally Model Features of Network Security Protocols, Gyesik Lee (pp. 423-432).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA