Skip to content
NADIA

IJSIA Vol. 8, No. 3, 2014

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2014
2014
Volume 8, Number 3, 2014 May
    • An Architecture Design for Wireless Authentication Security in Bluetooth Network, Bijoy Kumar Mandal, Debnath Bhattacharyya and Tai-hoon Kim (pp. 1-8).
    • Privacy- Preserving Keyword-based Semantic Search over Encrypted Cloud Data, Xingming Sun, Yanling Zhu, Zhihua Xia and Lihong Chen (pp. 9-20).
    • Secure Group Ownership Transfer Protocol for Tags in RFID System, Lei He, Yong Gan and Yi-feng Yin (pp. 21-30).
    • A New Left-to-Right Scalar Multiplication Algorithm Using a New Recoding Technique, Abdalhossein Rezai and Parviz Keshavarzi (pp. 31-38).
    • SSM: Secure Service Manager for the Internet of Things, Jiye Park and Namhi Kang (pp. 39-48).
    • Cryptographic Analysis and Improvement of the Structured Multi-signature Scheme for P2P E-Services, Ji Yi Wu, Yuquan Zhang, Jun Zhang and Wen Juan Li (pp. 49-62).
    • An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System, Young Sil Lee, Esko Alasaarela and Hoon Jae Lee (pp. 63-70).
    • Cloud-Computing-Based Risk Control System for Making Information Technology Outsourcing Secure, Ming Shao and Tao Gong (pp. 71-78).
    • A Design of e-Healthcare Authentication Framework with QR Code, Non Thiranant and Hoon Jae Lee (pp. 79-86).
    • A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection, Yuhui Fan and Ning Xu (pp. 87-96).
    • Distributed Signing Protocol for Tamper-Resistant Module, Shinsaku Kiyomoto, Tsukasa Ishiguro and Yutaka Miyake (pp. 97-106).
    • A Cooperative Intrusion Detection Model for Cloud Computing Networks, Shaohua Teng, Chaoyu Zheng, Haibin Zhu, Dongning Liu and Wei Zhang (pp. 107-118).
    • Intelligent Risk Mapping and Assessment System, Sang-Young Lee (pp. 119-124).
    • Based on the complex network of local routing strategy scale-free networks, Cao Fenglian and Wang Tao (pp. 125-136).
    • Cryptanalysis of A MultSecurity control analysis of ICS, Dongkyun Seo, Young In You and Kyungho Lee (pp. 137-142).i-use CCA-secure Proxy Re-encryption Scheme, Yi Cai and Deyu Qi (pp. 161-170).
    • Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent, Dan Guo (pp. 143-152).
    • Research on e-commerce security based on risk management perspective, Wu Yanyan (pp. 153-162).
    • Database Security Model in the Academic Information System, Ema Utami and Suwanto Raharjo (pp. 163-174).
    • Cooperative Architecture for Secure M2M Communication in Distributed Sensor Networking, Sungmo Jung, Donghyun Kim and Seoksoo Kim (pp. 175-184).
    • Sequence Composition Analysis of Noninterference in Cyber-Physical System with Petri Net, Jingming Wang, Huiqun Yu and Chunxia Leng (pp. 185-192).
    • Modeling of Risk Factors in Determining Network Security Level, Martin Suhartana, Bens Pardamean and Benfano Soewito (pp. 193-208).
    • Image Scrambling Algorithm based on Grouping Calculation, Lianyuan Jiang, Haohao Yuan, Jianbing Jiang, Yalan Zhang and Jian He (pp. 209-220).
    • Privilege Management System in Cloud Computing using Oauth, Jeong-Kyung Moon, Hwang-Rae Kim and Jin-Mook Kim (pp. 221-234).
    • Architecture Design and Cyber Security Evaluation of a Festival Management System Server, Han Seong Son and Soon Gohn Kim (pp. 235-240).
    • Security System for Healthcare Data in Cloud Computing, Maya Louk, Hyotaek Lim and Hoon Jae Lee (pp. 241-248).
    • Research on Intrusion Detection System Based on Clustering Fuzzy Support Vector Machine, Zhai Jinbiao (pp. 249-260).
    • Defense-in-Depth Architecture of Server Systems for the Improvement of Cyber Security, Hanseong Son and Soongohn Kim (pp. 261-266).
    • Customer Satisfaction Study of Disaster Recovery Based on IPA Model, En-lin Li (pp. 267-276).
    • Study on Risk Identification and Prevention of Power Transformer Based on Sampling Inspection Theory, TianShu Bi, JinMeng Chen and Meng Sun (pp. 277-288).
    • Risk Assessment of Power System under Typhoon Disaster, Hui Hou, Xiongkai He, Zheng-tian Li, Aihong Tang and Hua-liang Fang (pp. 289-296).
    • Research on Application of Listed Company Financial Fraud Distinguish Based on Acceleration-convergent BP network algorithm, Zhenjie Li (pp. 297-308).
    • Multi-cue Integration Object Tracking Based on Blocking, Lichuan Gu, Chengji Wang, Jinqin Zhong, Jianxiao Liu and Juan Wang (pp. 309-324).
    • Comparison of E-payment of the B2C E-commerce in China from the Security and Trust Perspective, YingHua Zhang and RenXiang Wang (pp. 325-338).
    • An Improved Wu-Manber Multiple Patterns Matching Algorithm for Mobile Internet Content Security Audit in a Chinese Environment, Zhenjiang Zhang, Xinlei Jin, Ziqi Hao and Xiaolan Guan (pp. 339-354).
    • Optimization Study on Interval Number Judgment Matrix Weight Vector Based on Immune Evolution Algorithm, Jianming Sun and Jing Wu (pp. 356-362).
    • Secure on Demand IP based Connection (SEDIC) for Virtual Private Networks(VPNs), Saadiah Yahya, Mohamed Sulaiman Sultan Suhaibuddeen, Zainab Abu Bakar and Ahmad Yusri Dak (pp. 363-376).
    • Metadata Driven Efficient CRE based Cipher Key Generation and Distribution in Cloud Security, R. Anitha and Saswati Mukherjee (pp. 377-392).
    • Improving the management of IDS alerts, Tu Hoang Nguyen, JiaWei Luo and Humphrey Waita Njogu (pp. 393-406).
    • SWOT analysis of access control models, Ennahbaoui Mohammed and El Hajji Said (pp. 407-424).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA