2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2014 2014 Volume 8, Number 2, 2014 March Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System, Sangkyo Oh, Hyunji Chung, Sangjin Lee and Kyungho Lee (pp. 1-8). A Secure and Efficient Vehicle-to-Vehicle Communication Scheme using Bloom Filter in VANETs, Su-Hyun Kim and Im-Yeong Lee (pp. 9-24). Lightweight Attestation Scheme for Wireless Sensor Network, Shinsaku Kiyomoto and Yutaka Miyake (pp. 25-40). Authorization of Cryptographic Module in Operational Environments, Hee Bong Choi, Hyuk Joong Yoon, Haeng Seok Ko and Il Jun Kim (pp. 41-48). Fault Diagnosis of Subsea Blowout Preventer Based on Artificial Neural Networks, Zengkai Liu, Yonghong Liu, Baoping Cai, Dawei Zhang and Junlei Li (pp. 49-58). Parallel Architecture for High-Speed Block Cipher, HIGHT, Je-Hoon Lee and Duk-Gyu Lim (pp. 59-66). A Smart-driver Based Method for Preventing SQL Injection Attacks, Zhongding Dong, Yun Liu, Guixun Luo and Sumeng Diao (pp. 67-76). A Study on Web Service Analysis and Bio-information based Web Service Security Mechanism, Seong-Hoon Lee (pp. 77-86). Detecting an Anomalous Traffic Attack Area based on Entropy Distribution and Mahalanobis Distance, Dolgormaa Bayarjargal and Gihwan Cho (pp. 87-94). Dynamic Control-limit Policy of Condition based Maintenance for the Hydroelectricity Generating Unit, Xinbo Qian and Yonggang Wu (pp. 95-106). Concept Design and Case Studies of Testbed based on Cloud Computing for Security Research, ByungRae Cha, SuJeong Sim and JongWon Kim (pp. 107-114). Secure USB Design Using Unallocated Arbitrary Area, Jae Hong Youn and Yoo-Kang Ji (pp. 115-124). Domain Specific Language for Detecting Intrusion Signatures with Genetic Search, Kanin Chotvorrarak and Yachai Limpiyakorn (pp. 125-138). An Embedded Encryption Protocol for Healthcare Networks Security, Ndibanje Bruce, Won Tae Jang and Hoon Jae Lee (pp. 139-144). A Practical Decision-Making Model for Security Products Preference, SungJin Kim, JunYoung Son, SeungHun Nam and ChaeHo Lim (pp. 145-156). Suspicious Transaction Detection for Anti-Money Laundering, Xingrong Luo (pp. 157-166). User Resistance of Mobile Banking in China: Focus on Perceived Risk, Shuang Cheng, Sang-Joon Lee and Kyeong-Rak Lee (pp. 167-172). The Study of Privacy Security in Mobile Traffic Control Environment, Byeong-Choon, Lee and Seung-Jung, Shin (pp. 173-182). Multi-Agent Distributed Intrusion Detection System Model Based on BP Neural Network, ZhaiShuang-can, Hu Chen-junand Zhang Wei-ming (pp. 183-192). Secure Streaming Media Data Management Protocol, Jeong-Min Do and You-Jin Song (pp. 193-202). User Behavior Research of Information Security Technology Based on TAM, Wang Cheng and Wang Shi-bo (pp. 203-210). Block Shuffling Approach for Contents Protection, Gwanggil Jeon (pp. 211-220). Review of How to Construct a Fully Homomorphic Encryption Scheme, ChenZhi-gang, WangJian, ChenLiqun and SongXin-xia (pp. 221-230). A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce, Wang Jin-Song, Zhang Long, Shi Kai and Zhang Hong-hao (pp. 231-242). Implementation of ARIA Cryptographic Modules based on ARM9 Devices, Okyeon Yi, Seunghwan Yun, Myungseo Park and HaengGwon Song (pp. 243-250). Based on WDM of Disk Immunity Systems, Peng Hai-Yun and Zhou Wen-Gang (pp. 251-260). An Experimental CPA attack for Arduino Cryptographic Module and Analysis in Software-based CPA Countermeasures, Young Jin Kang, Tae Yong Kim, Jung Bok Jo and Hoon Jae Lee (pp. 261-270). Online Banking Security Analysis based on STRIDE Threat Model, Tong Xin and Ban Xiaofang (pp. 271-282). A Study on Security Technique of Cloud Data Processing in Electronic Commerce, Wei Dai, XuefangZhang and PengHu (pp. 283-290). Design of Safe Internal Network with the Use of Active Tracking System, Hyung-Kyu Choi and Seung-Jung Shin (pp. 291-300). Reversible Data Hiding Scheme for BTC-compressed Images Based on Histogram Shifting, Chun-Chi Lo, Yu-Chen Hu, Wu-Lin Chen and Chang-Ming Wu (pp. 301-314). Moving Objects Representation for Object Based Surveillance Video Retrieval System, Jianping Han, Tian Tan, Longfei Chen and Daxing Zhang (pp. 315-322). An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data, Li Chen, Xingming Sun, Zhihua Xiaand Qi Liu (pp. 323-332). A Study on Surveillance System of Object’s Abnormal Behavior by Blob Composition Analysis, Young-Bin Shim, Hwa-Jin Park and Yong-Ik Yoon (pp. 333-340). A Design Approach for Wireless Communication Security in Bluetooth Network, Bijoy Kumar Mandal, Debnath Bhattacharyya and Tai-hoon Kim (pp. 341-352). Design of the New Efficient Decripting Machine, that can be Applied to the Wireless Sensor Network, Based on the GF(2n) Field Theory and the Modified RSA Algorithm, Hyeong-Keon An (pp. 353-362). An Efficient Identity-based Signcryption from Lattice, Xiufeng Zhao and Xiang Wang (pp. 363-374). Conflict Analysis between Task Iteration and Design Capabilities in Collaborative Product Development, Tao Yang, Yu Yang and Cheng Meng Xue (pp. 375-386). A Novel Personalized TTP-free Location Privacy Preserving Method, Nianhua Yang, Yuru Cao, Qing Liu and Jiming Zheng (pp. 387-398).