Skip to content
NADIA

IJSIA Vol. 8, No. 6, 2014

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2014
2014
Volume 8, Number 6, 2014 November
    • Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Dynamic Update, Xingming Sun, Lu Zhou, Zhangjie Fu, and Jin Wang (pp. 1-16).
    • P_PAKA: Privacy Preserving Authenticated Key Agreement Protocol in Smart Grid, Hyunsung Kim (pp. 17-24).
    • Block-Based Scheme for Database Integrity Verification, Lancine Camara, Junyi Li, Li Renfa, Faustin Kagorora, Damien Hanyurwimfura (pp. 25-40).
    • Analysis of Typical Secure Routing Protocols in WSN, Jingsha He, Bo Zhou and Ruohong Liu (pp. 41-50).
    • Implementation of Biometric Techniques in Social Networking Sites, Shilpi Sharma, J. S. Sodhi (pp. 51-60).
    • A Novel Image Encryption Scheme based on the LSM Chaotic System, Congxu Zhu, Yuping Hu, Xinran Zhou (pp. 61-70).
    • The Design of Robust Authentication Mechanism using User’s Biometrics Signals, Jung ho Eom (pp. 71-80).
    • A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain, Xin Tong, Xiaofang Ban (pp. 81-88).
    • A Zero-watermarking Scheme based on LPM and Holographic, De Li, LuYan Qiao, JongWeon Kim (pp. 89-100).
    • Honeypot-based Signature Generation for Polymorphic Worms, Sounak Paul, Bimal Kumar Mishra (pp. 101-114).
    • Shilling Attack Detection Algorithm based on Non-random-missing Mechanism, Man Li (pp. 115-126).
    • An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology, Jung Gil Cho and Won Whoi Huh (pp. 127-136).
    • The Design of Fingerprint Identification System based on Improved Binarization Algorithm, Zhu Heng-jun, Guo Ying, Zhang Nan-nan, Liang Hong (pp. 137-146).
    • Study on Financial-sector Information Security Level Assessment and Improvement Anticipation Model, Young-Rai Park, Yoon-Chul Choy, Won-Sung Shon (pp. 147-160).
    • The Network Attack Model based on Hierarchical Expanded Stochastic Petri Net, Yongfu Zhou (pp. 161-172).
    • A Difference Expansion Based Reversible Data Hiding Algorithm Using Edge-Oriented Prediction, Wen-Chao Yang, Ling-Hwei Chen and Chang-Hsing Lee (pp. 173-184).
    • The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology, Xin Huang, Rongze Wan (pp. 185-196).
    • Batch Auditing for Multi-client Dynamic Data in Multi-cloud Storage, Xin Liu and Yujia Jiang (pp. 197-210).
    • Steganography Technique for JPEG2000 Compressed Images Using Histogram in Wavelet Domain, Geeta Kasana, Kulbir Singh, Satvinder Singh Bhatia (pp. 211-224).
    • A Strong Lightweight Authentication Protocol for Low-cost RFID Systems, Zhicai Shi, Josef Pieprzyk, Christophe Doche, Yongxiang Xia, Yu Zhang, Jian Dai (pp. 225-234).
    • Still Images Watermarking Signature, Gwanggil Jeon (pp. 235-244).
    • A Novel Approach towards Detection of Spoofed Manufacturer Identity under the Collaborative Frameworks of Mobile Computing and Product Specific QR Codes, Soham Sengupta, Partha Pratim Sarkar (pp. 245-260).
    • Quantum Cryptanalysis of Multivariate Permutation Problem, Guodong Sun, Shenghui Su, Maozhi Xu (pp. 261-272).
    • Improved Life of Watchdog Nodes in Ad hoc Networks, Anitha M and Dr. Rhymend Uthariaraj V (pp. 273-284).
    • A Network Intrusion Detection Model Based on K-means Algorithm and Information Entropy, Gao Meng, Li Dan, Wang Ni-hong, Liu Li-chen (pp. 285-294).
    • A Secret Sharing Scheme Based on AES, Jie Cui, Lei Chen, Yiming Zhang, Zhiqiang Xie, Hong Zhong (pp. 295-302).
    • A New Factor State Space Model for SCADA Network Attack and Defense, Li Yang, Ling Wang, Xinyu Geng, Xiedong Cao (pp. 303-314).
    • A Survey of Digital Image Watermarking Optimization based on Nature Inspired Algorithms NIAs, Jumana Waleed, Huang Dong Jun, Thekra Abbas, Saad Hameed and Hiyam Hatem (pp. 315-334).
    • Construction and reduction methods of vulnerability index system In power SCADA, Yuancheng Li, Shengnan Chu (pp. 335-352).
    • Research on Intrusion Event Sequence Correlation Method for Privacy Protection, Duan Xueying (pp. 353-364).
    • Improved Fully Homomorphic Encryption over the Integers with Shorter Public Keys, Can Xiang, Chun-ming Tang (pp. 365-374).
    • A Security Assessment Framework and Selection Method for Outsourcing Cloud Service, Xiaochen Liu, Chunhe Xia, Jiajin Cao, Jinghua Gao, Zhao Wei (pp. 375-388).
    • An Access Authentication Scheme Based on 2-HIBS in Proxy Mobile IPv6 Network, Tianhan Gao (pp. 389-396).
    • OOAP: A Novel Authorization Protocol for Access to Sensitive Data in Trusted Cloud Computing Platforms, Dongjun Luo, Xiaoyun Wu, Xinwei Zheng and Yuping Hu (pp. 397-404).
    • A Recent Review of MP3 Based Steganography Methods, Mohsen Bazyar and Rubita Sudirman (pp. 405-414).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA