Skip to content
NADIA

IJSIA Vol. 8, No. 4, 2014

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2014
2014
Volume 8, Number 4, 2014 July
    • A Key Distribution Scheme for WSN Based on Deployment Knowledge and Dual-Key Pools, Lin You and Younan Yuan (pp. 1-16).
    • Issues toward Networks Architecture Security for LTE and LTE-A Networks, Jin Wang, Zhongqi Zhang, Yongjun Ren, Bin Li and Jeong-Uk Kim (pp. 17-24).
    • Protecting Seaport Communication System by Steganography Based Procedures, Yair Wiseman (pp. 25-36).
    • Research on Distinguish the Accounting Information Distortion Based on the Principle Components-logistic Regression Model, Zhenjie Li (pp. 37-50).
    • A Study of Key management Protocol for Secure Communication In Personal Cloud Environment, ByungWook Jin and Keun-Wang Lee (pp. 51-58).
    • Attacks and Threats on the U-Healthcare Application with Mobile Agent, Jung Tae Kim (pp. 59-66).
    • A Composite Intelligent Method for Spam Filtering, Jun Liu, Shuyu Chen, Kai Liu and Yong Zhou (pp. 67-76).
    • Quantum chaotic image encryption with one time running key, Cao Guanghui, Zhou Jun, Zhang Yizhi, Jiang Yueling and Zhang Xing (pp. 77-88).
    • A Block Encryption Scheme for Secure Still Visual Data based on One-Way Coupled Map Lattice, Alaa Zaghloul, Tiejun Zhang, Handan Hou, Mohamed Amin, Ahmed A. Abd El-Latif and Mohamed S. Abd El-Wahab (pp. 89-100).
    • Approaches for testing and evaluation of XACML Policies, Izzat M Alsmadi (pp. 101-112).
    • A Sticker-Based Model Using DNA Computing for Generating Real Random Numbers, Saman Hedayatpour, Nazri Kama and Suriayati Chuprat (pp. 113-122).
    • End-to-End Authentication Protocols for Personal/Portable Devices over Cognitive Radio Networks, Hyunsung Kim (pp. 123-138).
    • Advanced Mobile Security System Operated by Bioelectrical Sensor, Kalanyu Zintus-art, Duk Shin, Natsue Yoshimura, Hiroyuki Kambara and Yasuharu Koike (pp. 139-150).
    • Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol, Youngsook Lee (pp. 151-160).
    • Cryptanalysis of A Multi-use CCA-secure Proxy Re-encryption Scheme, Yi Cai and Deyu Qi (pp. 161-170).
    • Optimizing the computing of pairing with Miller’s algorithm, Siham Ezzouak, Mohammed El Amrani and Abdelmalek Azizi (pp. 171-182).
    • High Payload and Secure Steganography method Based on Block Partitioning and Integer Wavelet Transform, Seyyed Amin Seyyedi and Nick Ivanov (pp. 183-194).
    • Predicting Terroristic Attacks in Urban Environments: An Internet-of-Things Approach, Stavros Petris, Christos Georgoulis, John Soldatos, Ilaria Giordani, Raul Sormani and Divna Djordjevic (pp. 195-218).
    • Securing Bluetooth Communication with Hybrid Pairing Protocol, J. T. Lalis, B. D. Gerardo and Y. Byun (pp. 219-228).
    • Study on Enhancing Vulnerability Evaluations for BYOD Security, Kyong-jin Kim and Seng-phil Hong (pp. 229-238).
    • Research and Implementation of an Integrity Video Watermarking Authentication Algorithm, Guochuan Shi, Guanyu Chen, Binhao Shi, Jiangwei Li and Kai Shu (pp. 239-246).
    • A Study on the Improvements of Information Security Management System for Environment Education Institutes, Chulki Jeong and Sungjin Ahn (pp. 247-252).
    • Robust online filter recommended algorithm based on attack profile, Gao Feng (pp. 253-264).
    • Iris Feature Extraction based on Haar Wavelet Transform, Zhu Wen Yao, Zhou jun, Wu Yu Feng and Wang Ming Jun (pp. 265-272).
    • Shilling attack detection algorithm based on Genetic optimization, Tao Li (pp. 273-286).
    • Secure DRM Scheme Supporting Dynamic Authorization Using Attribute-Based Encryption, Fu Jingyi, Ma Zhaofeng, Huang Qinlong and Yang Yixian (pp. 287-296).
    • Survey on reversible data hiding techniques, M. Manju and V. Kavitha (pp. 297-306).
    • Privacy Preserving Three-party Authenticated Key Agreement Protocol using Smart Cards, Suyeon Park and Hee-Joo Park (pp. 307-320).
    • Research on the Security based on Utility Theory in Cloud Computing Environment, Jie Hui Ju, Zhong You Wang, Wen Juan Li, Wei Zheng Bao and Ya Wang (pp. 321-328).
    • Defending Against sybil-attacks in Peer-to-Peer Networks, Xu Xiang, Lu Huijuan and Chen Lianna (pp. 329-340).
    • A Study on Behavioral Intention of Sharp (#) Mail Potential Users Focused on Non-Repudiation Function, Kil-Hwan Shin and Choon Yeul Lee (pp. 341-352).
    • Preventive Maintenance Model Analysis Based on Condition, Hongsheng Su (pp. 353-366).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA