Skip to content
NADIA

IJSIA Vol. 8, No. 2, 2014

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2014
2014
Volume 8, Number 2, 2014 March
    • Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System, Sangkyo Oh, Hyunji Chung, Sangjin Lee and Kyungho Lee (pp. 1-8).
    • A Secure and Efficient Vehicle-to-Vehicle Communication Scheme using Bloom Filter in VANETs, Su-Hyun Kim and Im-Yeong Lee (pp. 9-24).
    • Lightweight Attestation Scheme for Wireless Sensor Network, Shinsaku Kiyomoto and Yutaka Miyake (pp. 25-40).
    • Authorization of Cryptographic Module in Operational Environments, Hee Bong Choi, Hyuk Joong Yoon, Haeng Seok Ko and Il Jun Kim (pp. 41-48).
    • Fault Diagnosis of Subsea Blowout Preventer Based on Artificial Neural Networks, Zengkai Liu, Yonghong Liu, Baoping Cai, Dawei Zhang and Junlei Li (pp. 49-58).
    • Parallel Architecture for High-Speed Block Cipher, HIGHT, Je-Hoon Lee and Duk-Gyu Lim (pp. 59-66).
    • A Smart-driver Based Method for Preventing SQL Injection Attacks, Zhongding Dong, Yun Liu, Guixun Luo and Sumeng Diao (pp. 67-76).
    • A Study on Web Service Analysis and Bio-information based Web Service Security Mechanism, Seong-Hoon Lee (pp. 77-86).
    • Detecting an Anomalous Traffic Attack Area based on Entropy Distribution and Mahalanobis Distance, Dolgormaa Bayarjargal and Gihwan Cho (pp. 87-94).
    • Dynamic Control-limit Policy of Condition based Maintenance for the Hydroelectricity Generating Unit, Xinbo Qian and Yonggang Wu (pp. 95-106).
    • Concept Design and Case Studies of Testbed based on Cloud Computing for Security Research, ByungRae Cha, SuJeong Sim and JongWon Kim (pp. 107-114).
    • Secure USB Design Using Unallocated Arbitrary Area, Jae Hong Youn and Yoo-Kang Ji (pp. 115-124).
    • Domain Specific Language for Detecting Intrusion Signatures with Genetic Search, Kanin Chotvorrarak and Yachai Limpiyakorn (pp. 125-138).
    • An Embedded Encryption Protocol for Healthcare Networks Security, Ndibanje Bruce, Won Tae Jang and Hoon Jae Lee (pp. 139-144).
    • A Practical Decision-Making Model for Security Products Preference, SungJin Kim, JunYoung Son, SeungHun Nam and ChaeHo Lim (pp. 145-156).
    • Suspicious Transaction Detection for Anti-Money Laundering, Xingrong Luo (pp. 157-166).
    • User Resistance of Mobile Banking in China: Focus on Perceived Risk, Shuang Cheng, Sang-Joon Lee and Kyeong-Rak Lee (pp. 167-172).
    • The Study of Privacy Security in Mobile Traffic Control Environment, Byeong-Choon, Lee and Seung-Jung, Shin (pp. 173-182).
    • Multi-Agent Distributed Intrusion Detection System Model Based on BP Neural Network, ZhaiShuang-can, Hu Chen-junand Zhang Wei-ming (pp. 183-192).
    • Secure Streaming Media Data Management Protocol, Jeong-Min Do and You-Jin Song (pp. 193-202).
    • User Behavior Research of Information Security Technology Based on TAM, Wang Cheng and Wang Shi-bo (pp. 203-210).
    • Block Shuffling Approach for Contents Protection, Gwanggil Jeon (pp. 211-220).
    • Review of How to Construct a Fully Homomorphic Encryption Scheme, ChenZhi-gang, WangJian, ChenLiqun and SongXin-xia (pp. 221-230).
    • A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce, Wang Jin-Song, Zhang Long, Shi Kai and Zhang Hong-hao (pp. 231-242).
    • Implementation of ARIA Cryptographic Modules based on ARM9 Devices, Okyeon Yi, Seunghwan Yun, Myungseo Park and HaengGwon Song (pp. 243-250).
    • Based on WDM of Disk Immunity Systems, Peng Hai-Yun and Zhou Wen-Gang (pp. 251-260).
    • An Experimental CPA attack for Arduino Cryptographic Module and Analysis in Software-based CPA Countermeasures, Young Jin Kang, Tae Yong Kim, Jung Bok Jo and Hoon Jae Lee (pp. 261-270).
    • Online Banking Security Analysis based on STRIDE Threat Model, Tong Xin and Ban Xiaofang (pp. 271-282).
    • A Study on Security Technique of Cloud Data Processing in Electronic Commerce, Wei Dai, XuefangZhang and PengHu (pp. 283-290).
    • Design of Safe Internal Network with the Use of Active Tracking System, Hyung-Kyu Choi and Seung-Jung Shin (pp. 291-300).
    • Reversible Data Hiding Scheme for BTC-compressed Images Based on Histogram Shifting, Chun-Chi Lo, Yu-Chen Hu, Wu-Lin Chen and Chang-Ming Wu (pp. 301-314).
    • Moving Objects Representation for Object Based Surveillance Video Retrieval System, Jianping Han, Tian Tan, Longfei Chen and Daxing Zhang (pp. 315-322).
    • An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data, Li Chen, Xingming Sun, Zhihua Xiaand Qi Liu (pp. 323-332).
    • A Study on Surveillance System of Object’s Abnormal Behavior by Blob Composition Analysis, Young-Bin Shim, Hwa-Jin Park and Yong-Ik Yoon (pp. 333-340).
    • A Design Approach for Wireless Communication Security in Bluetooth Network, Bijoy Kumar Mandal, Debnath Bhattacharyya and Tai-hoon Kim (pp. 341-352).
    • Design of the New Efficient Decripting Machine, that can be Applied to the Wireless Sensor Network, Based on the GF(2n) Field Theory and the Modified RSA Algorithm, Hyeong-Keon An (pp. 353-362).
    • An Efficient Identity-based Signcryption from Lattice, Xiufeng Zhao and Xiang Wang (pp. 363-374).
    • Conflict Analysis between Task Iteration and Design Capabilities in Collaborative Product Development, Tao Yang, Yu Yang and Cheng Meng Xue (pp. 375-386).
    • A Novel Personalized TTP-free Location Privacy Preserving Method, Nianhua Yang, Yuru Cao, Qing Liu and Jiming Zheng (pp. 387-398).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA