2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2014 2014 Volume 8, Number 3, 2014 May An Architecture Design for Wireless Authentication Security in Bluetooth Network, Bijoy Kumar Mandal, Debnath Bhattacharyya and Tai-hoon Kim (pp. 1-8). Privacy- Preserving Keyword-based Semantic Search over Encrypted Cloud Data, Xingming Sun, Yanling Zhu, Zhihua Xia and Lihong Chen (pp. 9-20). Secure Group Ownership Transfer Protocol for Tags in RFID System, Lei He, Yong Gan and Yi-feng Yin (pp. 21-30). A New Left-to-Right Scalar Multiplication Algorithm Using a New Recoding Technique, Abdalhossein Rezai and Parviz Keshavarzi (pp. 31-38). SSM: Secure Service Manager for the Internet of Things, Jiye Park and Namhi Kang (pp. 39-48). Cryptographic Analysis and Improvement of the Structured Multi-signature Scheme for P2P E-Services, Ji Yi Wu, Yuquan Zhang, Jun Zhang and Wen Juan Li (pp. 49-62). An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System, Young Sil Lee, Esko Alasaarela and Hoon Jae Lee (pp. 63-70). Cloud-Computing-Based Risk Control System for Making Information Technology Outsourcing Secure, Ming Shao and Tao Gong (pp. 71-78). A Design of e-Healthcare Authentication Framework with QR Code, Non Thiranant and Hoon Jae Lee (pp. 79-86). A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection, Yuhui Fan and Ning Xu (pp. 87-96). Distributed Signing Protocol for Tamper-Resistant Module, Shinsaku Kiyomoto, Tsukasa Ishiguro and Yutaka Miyake (pp. 97-106). A Cooperative Intrusion Detection Model for Cloud Computing Networks, Shaohua Teng, Chaoyu Zheng, Haibin Zhu, Dongning Liu and Wei Zhang (pp. 107-118). Intelligent Risk Mapping and Assessment System, Sang-Young Lee (pp. 119-124). Based on the complex network of local routing strategy scale-free networks, Cao Fenglian and Wang Tao (pp. 125-136). Cryptanalysis of A MultSecurity control analysis of ICS, Dongkyun Seo, Young In You and Kyungho Lee (pp. 137-142).i-use CCA-secure Proxy Re-encryption Scheme, Yi Cai and Deyu Qi (pp. 161-170). Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent, Dan Guo (pp. 143-152). Research on e-commerce security based on risk management perspective, Wu Yanyan (pp. 153-162). Database Security Model in the Academic Information System, Ema Utami and Suwanto Raharjo (pp. 163-174). Cooperative Architecture for Secure M2M Communication in Distributed Sensor Networking, Sungmo Jung, Donghyun Kim and Seoksoo Kim (pp. 175-184). Sequence Composition Analysis of Noninterference in Cyber-Physical System with Petri Net, Jingming Wang, Huiqun Yu and Chunxia Leng (pp. 185-192). Modeling of Risk Factors in Determining Network Security Level, Martin Suhartana, Bens Pardamean and Benfano Soewito (pp. 193-208). Image Scrambling Algorithm based on Grouping Calculation, Lianyuan Jiang, Haohao Yuan, Jianbing Jiang, Yalan Zhang and Jian He (pp. 209-220). Privilege Management System in Cloud Computing using Oauth, Jeong-Kyung Moon, Hwang-Rae Kim and Jin-Mook Kim (pp. 221-234). Architecture Design and Cyber Security Evaluation of a Festival Management System Server, Han Seong Son and Soon Gohn Kim (pp. 235-240). Security System for Healthcare Data in Cloud Computing, Maya Louk, Hyotaek Lim and Hoon Jae Lee (pp. 241-248). Research on Intrusion Detection System Based on Clustering Fuzzy Support Vector Machine, Zhai Jinbiao (pp. 249-260). Defense-in-Depth Architecture of Server Systems for the Improvement of Cyber Security, Hanseong Son and Soongohn Kim (pp. 261-266). Customer Satisfaction Study of Disaster Recovery Based on IPA Model, En-lin Li (pp. 267-276). Study on Risk Identification and Prevention of Power Transformer Based on Sampling Inspection Theory, TianShu Bi, JinMeng Chen and Meng Sun (pp. 277-288). Risk Assessment of Power System under Typhoon Disaster, Hui Hou, Xiongkai He, Zheng-tian Li, Aihong Tang and Hua-liang Fang (pp. 289-296). Research on Application of Listed Company Financial Fraud Distinguish Based on Acceleration-convergent BP network algorithm, Zhenjie Li (pp. 297-308). Multi-cue Integration Object Tracking Based on Blocking, Lichuan Gu, Chengji Wang, Jinqin Zhong, Jianxiao Liu and Juan Wang (pp. 309-324). Comparison of E-payment of the B2C E-commerce in China from the Security and Trust Perspective, YingHua Zhang and RenXiang Wang (pp. 325-338). An Improved Wu-Manber Multiple Patterns Matching Algorithm for Mobile Internet Content Security Audit in a Chinese Environment, Zhenjiang Zhang, Xinlei Jin, Ziqi Hao and Xiaolan Guan (pp. 339-354). Optimization Study on Interval Number Judgment Matrix Weight Vector Based on Immune Evolution Algorithm, Jianming Sun and Jing Wu (pp. 356-362). Secure on Demand IP based Connection (SEDIC) for Virtual Private Networks(VPNs), Saadiah Yahya, Mohamed Sulaiman Sultan Suhaibuddeen, Zainab Abu Bakar and Ahmad Yusri Dak (pp. 363-376). Metadata Driven Efficient CRE based Cipher Key Generation and Distribution in Cloud Security, R. Anitha and Saswati Mukherjee (pp. 377-392). Improving the management of IDS alerts, Tu Hoang Nguyen, JiaWei Luo and Humphrey Waita Njogu (pp. 393-406). SWOT analysis of access control models, Ennahbaoui Mohammed and El Hajji Said (pp. 407-424).