Skip to content
NADIA

IJSIA Vol. 9, No. 1, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 1, 2015 January
      • Phishing Sites and Prevention Measures, Zhou Fuan (pp. 1-10).
      • An Enhanced Trust Management Framework for MANET using Fuzzy Prediction Mechanism, V. Hemamalini, G. Zayaraz and V. Vijayalakshmi (pp. 11-24).
      • Improved Tent Map and Its Applications in Image Encryption, Xuefeng Liao (pp. 25-34).
      • A High-security RFID Grouping Proof Protocol, Ping Huang and Haibing Mu (pp. 35-44).
      • Proposal: A Design of E-learning User Authentication System, Byeong Ho Kang and Hyejin Kim (pp. 45-50).
      • Implementation: Mobile Face Identity Authentication System on Android Platforms, Pinjie Ye, Mengmeng Yu and Minghui Wu (pp. 51-60).
      • Steganalysis using Regional Correlation and Second-order Markov Features, Su Jinyang, Zeng Xianting and Wang Lei (pp. 69-76).
      • New Arbitrated Quantum Signature Scheme without Entangled State, Jiang Guan Xiong and Zhang Jun (pp. 77-88).
      • FPGA Implementation of Watermarking Scheme Using XSG, Korrapati Rajitha, Usha Rani.Nelakuditi, Venkata Naresh Mandhala and Tai-hoon Kim (pp. 89-96).
      • Cross-access Method for Team Confidential Document Based on Offline Key Management, Haoli Luan, Cunxu Wang, Zhenliu Zhou and Zheng Yang (pp. 97-108).
      • Analysis Method based on Rough Attack-defense Bayes Game Model, Kai Zhang (pp. 109-118).
      • Security Challenges for Building Knowledge-Based Economy in Nigeria, L. J. Muhammad, Abdullahi Garba Ali and Ibrahim Sani Iliya (pp. 119-124).
      • A Secure Data Transmission Scheme Based on Information Hiding in Wireless Sensor Networks, Baowei Wang, Hongwei Qian, Xingming Sun, Jian Shen and Xiaoyu Xie (pp. 125-138).
      • A Simple Security Architecture for Mobile Office, Seungcheon Kim and Hoon Jin (pp. 139-146).
      • Comment on New Construction of Efficient Certificateless Aggregate Signatures, Yulei Zhang and Caifen Wang (pp. 147-154).
      • A Systematic Review of Studies on Cyber Physical System Security, Peiyuan Dong, Yue Han, Xiaobo Gu1 and Feng Xie (pp. 155-164).
      • Feed Forward Networks in Color Extended Visual Cryptography to Generate Meaningful Shares, J. Ida Christy and V. Seenivasagam (pp. 165-178).
      • Universally Composable Attribute-based Group Key Exchange, Hui Xie, Yongjie Yan and Sihui Shu (pp. 179-190).
      • A (n,t,n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction, Li Meng, Qu Shaoyun, Xun Tiantian and Yu Jia (pp. 191-204).
      • SBISurban-Secure Urban Bus Information System based on Smart Devices, Donghyuk Park and Hyunsung Kim (pp. 205-220).
      • On the Security and Robustness with Fingerprint Watermarking Signal via Compressed Sensing, Huimin Zhao and Yanmei Fang (pp. 221-236).
      • Hiding Messages using Musical Notes: A Fuzzy Logic Approach, Chandan Kumar, Sandip Dutta and Soubhik Chakraborty (pp. 237-248).
      • Privacy Protection for LBS in Mobile Environments: Progresses, Issues and Challenges, Julong Pan, Zhengwei Zuo, Zhanyi Xu and Qun Jin (pp. 249-258).
      • A New (n, n)-threshold Reversible Secret Image Sharing Using Histogram Shifting, Gil-Je Lee, Dae-Soo Kim and Kee-Young Yoo (pp. 259-270).
      • A Unified Authentication Scheme Based on Analytic Mechanism, Yong Xu, Yejuan Cheng and Chang Xiao (pp. 271-282).
      • An Effective Approach of Distortion-Resistant Video Watermarking for Piracy Deterrence, Nilesh Kumar Dubey and Shishir Kumar (pp. 283-294).
      • A Novel Preserving Client Privacy and Designate Verifier Auditing Scheme for Cloud Storage, Jiang Xu, Wenliang Chen, Sai Ji, Yongjun Ren, Jin Wang (pp. 295-304).
      • Watermarking Scheme of MPEG-4 LASeR Object for Mobile Device, Dae-Jea Cho (pp. 305-312).
      • Towards Attacks and Defenses of Anonymous Communication Systems, Tianbo Lu, Puxin Yao, Lingling Zhao, Yang Li, Feng Xie and Yamei Xia (pp. 313-328).
      • SMS Spam Filterinig Using Keyword Frequency Ratio, Sin-Eon Kima, Jung-Tae Job and Sang-Hyun Choic (pp. 329-336).
      • A Novel Method of Protection of Monitor Link, Guo Hong-tao (pp. 337-346).
      • Research on Safety Distance Mathematical Model of Pro-Active Head Restraint in Rear-end Collision Avoidance System, Xiaoqin Yin and Mingxia Wang (pp. 347-356).
      • Network Threat Analysis based on Vulnerability Relation Model, Zhihong Wang (pp. 357-368).
      • Efficient Methods to Trigger Adversarial Behaviors from Malware during Virtual Execution in SandBox, Jung-Uk Joo, Incheol Shin, Minsoo Kim (pp. 369-376).
      • Arbitrated Proxy Signature Scheme Based on Quantum Cryptography, Wang Xiuqing and Zhang Jun (pp. 377-386).
      • Security on Dynamic ID-based Authentication Schemes, Jingxuan Zhai, Tianjie Cao, Xiuqing Chen and Shi Huang (pp. 387-396).
      • An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card, Khanjan Ch. Baruah, Subhasish Banerjee, Manash P. Dutta and Chandan T. Bhunia (pp. 397-408).
      • Joint Fingerprinting/Encryption for Medical Image Security, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xueming Zhang, Guangwei Wang and Fang Xu (pp. 409-418).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA