Skip to content
NADIA

IJSIA Vol. 9, No. 12, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 12, 2015 December
    • Technique for Intrusion Detection based on Minkowsky Distance Negative Selection Algorithm, Niu Ling, Feng Gao-feng and Peng Hai-yun (pp. 1-10).
    • Development of a Cloud Computing Interoperability-Based Service Certification, Kangchan Lee, Chulwoo Park and Hee-Dong Yang (pp. 11-20).
    • Finite Server Queuing Model with Change-Point and Imperfect Debugging for Software Reliability Assessment, Zhang Nan (pp. 21-28).
    • A Parallel Method of Deep Packet Inspection based on Message-Passing Interface, Jia-xing Qu, Guo-yin Zhang, Xi-zhong Wang, Jia-hui Liu and Da-hua Song (pp. 29-34).
    • Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment, Abderrahim Abdellaoui, Younes Idrissi Khamlichi and Habiba Chaoui (pp. 35-46).
    • ICP Registration Technology based on the Coordinate System Direction Fit, Heqiang Tian, Peng Yang, Chunjian Su and Zhiqiang Dong (pp. 47-56).
    • A Study on the Dos Prevention System for SPT-based Sync Flooding Protection, Keun-Heui Kim, Young-Mo Kang, Mi-Ran Han, and Jong-Bae Kim (pp. 57-66).
    • Research on Robustness Tracking of Maneuvering Target for Bionic Robot, Wang Peng, Wu Jian, Zhang Yuan, Li Jixiang and Zhang Pen (pp. 67-76).
    • Enhanced Security Certificateless Key Agreement Scheme Design, Tianwei Che, Yuchen Zhang, Jianfeng Ma and Na L (pp. 77-84).
    • Hybrid Lightweight and Robust Encryption Design for Security in IoT, Abhijit Patil, Gaurav Bansod and Narayan Pisharoty (pp. 85-98).
    • Risk Assessment of Power System Security based on a Hybrid Optimization GP Method, Xiaobin Wu, Hui Li and Xiaolu Chen (pp. 99-114).
    • An Algorithm of Clustering by Density Peaks Using in Anomaly Detection, Chunyong Yin, Sun Zhang, Zhichao Yin and Jin Wang (pp. 115-128).
    • Enhanced Biometric-based User Authentication Protocol Using Non-tamper Resistant Smart Cards, Minsu Park and Hyunsung Kim (pp. 129-136).
    • Research on the Error Detection Technology of Complex Parts based on Improved Bee Colony Algorithm, Jianghua Ge, Huihui Zhang, Yaping Wang, Xiulin Sui and Yongguo Sun (pp. 137-148).
    • Face Recognition and Template Protection with Shielding Function, Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah and Ramlan Mahmod (pp. 149-164).
    • Cryptanalysis and Improvement of RFID Ownership Transfer Protocol, Xiuqing Chen, Qiang Zhao, Tianjie Cao and Jingxuan Zha (pp. 165-174).
    • Toward Anomaly Detection in IaaS Cloud Computing Platforms, Mingwei Lin, Zhiqiang Yao, Fei Gao and Yang Li (pp. 175-188).
    • Preserving Location Privacy in Location Based Services against Sybil Attacks, Amit Kumar Tyagi and N. Sreenath (pp. 189-210).
    • Inter-domain Alliance Authentication Protocol Based on Blind Signature, Zhang Jie, Zhang Qi-kun, Gan Yong, Yin Yifeng and Tan Yu-an (pp. 211-220).
    • Experimental Analysis and Review of “Increased Capacity of Information Hiding”, Aqsa Rashid and Muhammad Khurrum Rahim (pp. 221-230).
    • Road Network-based Location Privacy Protection, Chen Wen (pp. 231-236).
    • Multiparty Access Control of Ciphertext Sharing in Cloud-Based Online Social Networks, Huang Qinlong, Ma Zhaofeng, Yang Yixian and Niu Xinxin (pp. 237-250).
    • A New Remote User Authentication Scheme based on Graphical Password using Smart Card, Khanjan Ch. Baruah, Subhasish Banerjee, Manash P. Dutta and Chandan T. Bhunia (pp. 251-258).
    • A Robust Information Hiding Scheme for Protecting Digital Content in DWT-CS Domain, Huimin Zhao, Jun Cai and Li Zhu (pp. 259-268).
    • Frequency Tracking of Power Grid based on Phase Difference and UKF, Xiaobing Zhang, Wei Dong and Shichao Jiang (pp. 269-278).
    • An Efficient Image Cryptographic Algorithm based on Frequency Domain using Haar Wavelet Transform, Kalyani Mali, Shouvik Chakraborty, Arindrajit Seal, and Mousomi Roy (pp. 279-288).
    • Research on Transaction Security Mechanism of Mobile Commerce in Mobile Internet based on MAS, Jiang Wei-Jin, Xu Yu-Sheng, Guo Hong and Zhang Lian-Mei (pp. 289-302).
    • Reliability Analysis of Unrepairable Systems with Uncertain Lifetimes, Ying Liu, Xiaozhong Li and Congcong Xiong (pp. 303-312).
    • Encryption of Query in DNS Message, Kaouthar Chetioui, Ghizlane Orhanou and Said El Hajji (pp. 313-322).
    • An Approach Converting XMI to SMV, Rongshang Chen, Jinyu Kai, Ming Xu and Lei Xia (pp. 323-330).
    • A Robust Data Embedding Method for MPEG Layer III Audio Steganography, Mohsen Bazyar and Rubita Sudirman (pp. 331-342).
    • Numerical Simulating Long-Distance Emergency Rescue System for Belt Fire in Coal Mine, Shao Hao, Jiang Shuguang, Wu Zhengyan, Zhang Weiqingand Wang Ka (pp. 343-360).
    • Cross-Domain Authorization Management Model for Multi-Levels Hybrid Cloud Computing, Li Na, Dong Yun-Wei, Che Tian-Wei, Wang Chao,Gao Yang and Zhang Yu-Chen (pp. 361-372).
    • Performance Comparison of Keccak, Skein, Grøstl, Blake and JH: SHA-3 Final Round Candidate Algorithms on ARM Cortex A8 Processor, Rajeev Sobti and G. Geetha (pp. 373-384).
    • Review of Security Research on Address Resolution Protocols, Song Guangjia and Ji Zhenzhou (pp. 385-404).
    • Research on Non-interactive Construction based on Fuzzy Conditional Proxy Re-encryption, Chunpeng Ge, Jiandong Wang and Liming F (pp. 405-418).
    • Public Key Generation and Encryption Mechanism Using the Elliptic Curve in Smart Phones, Seung-Ho Shin and Hee-Ju Eun (pp. 419-428).
    • Research on the Consumer Rights Protection in Online Shopping: a Empirical Analysis based on Consumer Credit Law, Shuangjun Xu (pp. 429-438).
    • Peer Effect in Spreading Network of Fake Information in Public Crisis, Xiaoxia Zhu, Mengmeng Liu and Haiju Hu (pp. 439-446).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA