2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2015 2015 Volume 9, Number 12, 2015 December Technique for Intrusion Detection based on Minkowsky Distance Negative Selection Algorithm, Niu Ling, Feng Gao-feng and Peng Hai-yun (pp. 1-10). Development of a Cloud Computing Interoperability-Based Service Certification, Kangchan Lee, Chulwoo Park and Hee-Dong Yang (pp. 11-20). Finite Server Queuing Model with Change-Point and Imperfect Debugging for Software Reliability Assessment, Zhang Nan (pp. 21-28). A Parallel Method of Deep Packet Inspection based on Message-Passing Interface, Jia-xing Qu, Guo-yin Zhang, Xi-zhong Wang, Jia-hui Liu and Da-hua Song (pp. 29-34). Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment, Abderrahim Abdellaoui, Younes Idrissi Khamlichi and Habiba Chaoui (pp. 35-46). ICP Registration Technology based on the Coordinate System Direction Fit, Heqiang Tian, Peng Yang, Chunjian Su and Zhiqiang Dong (pp. 47-56). A Study on the Dos Prevention System for SPT-based Sync Flooding Protection, Keun-Heui Kim, Young-Mo Kang, Mi-Ran Han, and Jong-Bae Kim (pp. 57-66). Research on Robustness Tracking of Maneuvering Target for Bionic Robot, Wang Peng, Wu Jian, Zhang Yuan, Li Jixiang and Zhang Pen (pp. 67-76). Enhanced Security Certificateless Key Agreement Scheme Design, Tianwei Che, Yuchen Zhang, Jianfeng Ma and Na L (pp. 77-84). Hybrid Lightweight and Robust Encryption Design for Security in IoT, Abhijit Patil, Gaurav Bansod and Narayan Pisharoty (pp. 85-98). Risk Assessment of Power System Security based on a Hybrid Optimization GP Method, Xiaobin Wu, Hui Li and Xiaolu Chen (pp. 99-114). An Algorithm of Clustering by Density Peaks Using in Anomaly Detection, Chunyong Yin, Sun Zhang, Zhichao Yin and Jin Wang (pp. 115-128). Enhanced Biometric-based User Authentication Protocol Using Non-tamper Resistant Smart Cards, Minsu Park and Hyunsung Kim (pp. 129-136). Research on the Error Detection Technology of Complex Parts based on Improved Bee Colony Algorithm, Jianghua Ge, Huihui Zhang, Yaping Wang, Xiulin Sui and Yongguo Sun (pp. 137-148). Face Recognition and Template Protection with Shielding Function, Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah and Ramlan Mahmod (pp. 149-164). Cryptanalysis and Improvement of RFID Ownership Transfer Protocol, Xiuqing Chen, Qiang Zhao, Tianjie Cao and Jingxuan Zha (pp. 165-174). Toward Anomaly Detection in IaaS Cloud Computing Platforms, Mingwei Lin, Zhiqiang Yao, Fei Gao and Yang Li (pp. 175-188). Preserving Location Privacy in Location Based Services against Sybil Attacks, Amit Kumar Tyagi and N. Sreenath (pp. 189-210). Inter-domain Alliance Authentication Protocol Based on Blind Signature, Zhang Jie, Zhang Qi-kun, Gan Yong, Yin Yifeng and Tan Yu-an (pp. 211-220). Experimental Analysis and Review of “Increased Capacity of Information Hiding”, Aqsa Rashid and Muhammad Khurrum Rahim (pp. 221-230). Road Network-based Location Privacy Protection, Chen Wen (pp. 231-236). Multiparty Access Control of Ciphertext Sharing in Cloud-Based Online Social Networks, Huang Qinlong, Ma Zhaofeng, Yang Yixian and Niu Xinxin (pp. 237-250). A New Remote User Authentication Scheme based on Graphical Password using Smart Card, Khanjan Ch. Baruah, Subhasish Banerjee, Manash P. Dutta and Chandan T. Bhunia (pp. 251-258). A Robust Information Hiding Scheme for Protecting Digital Content in DWT-CS Domain, Huimin Zhao, Jun Cai and Li Zhu (pp. 259-268). Frequency Tracking of Power Grid based on Phase Difference and UKF, Xiaobing Zhang, Wei Dong and Shichao Jiang (pp. 269-278). An Efficient Image Cryptographic Algorithm based on Frequency Domain using Haar Wavelet Transform, Kalyani Mali, Shouvik Chakraborty, Arindrajit Seal, and Mousomi Roy (pp. 279-288). Research on Transaction Security Mechanism of Mobile Commerce in Mobile Internet based on MAS, Jiang Wei-Jin, Xu Yu-Sheng, Guo Hong and Zhang Lian-Mei (pp. 289-302). Reliability Analysis of Unrepairable Systems with Uncertain Lifetimes, Ying Liu, Xiaozhong Li and Congcong Xiong (pp. 303-312). Encryption of Query in DNS Message, Kaouthar Chetioui, Ghizlane Orhanou and Said El Hajji (pp. 313-322). An Approach Converting XMI to SMV, Rongshang Chen, Jinyu Kai, Ming Xu and Lei Xia (pp. 323-330). A Robust Data Embedding Method for MPEG Layer III Audio Steganography, Mohsen Bazyar and Rubita Sudirman (pp. 331-342). Numerical Simulating Long-Distance Emergency Rescue System for Belt Fire in Coal Mine, Shao Hao, Jiang Shuguang, Wu Zhengyan, Zhang Weiqingand Wang Ka (pp. 343-360). Cross-Domain Authorization Management Model for Multi-Levels Hybrid Cloud Computing, Li Na, Dong Yun-Wei, Che Tian-Wei, Wang Chao,Gao Yang and Zhang Yu-Chen (pp. 361-372). Performance Comparison of Keccak, Skein, Grøstl, Blake and JH: SHA-3 Final Round Candidate Algorithms on ARM Cortex A8 Processor, Rajeev Sobti and G. Geetha (pp. 373-384). Review of Security Research on Address Resolution Protocols, Song Guangjia and Ji Zhenzhou (pp. 385-404). Research on Non-interactive Construction based on Fuzzy Conditional Proxy Re-encryption, Chunpeng Ge, Jiandong Wang and Liming F (pp. 405-418). Public Key Generation and Encryption Mechanism Using the Elliptic Curve in Smart Phones, Seung-Ho Shin and Hee-Ju Eun (pp. 419-428). Research on the Consumer Rights Protection in Online Shopping: a Empirical Analysis based on Consumer Credit Law, Shuangjun Xu (pp. 429-438). Peer Effect in Spreading Network of Fake Information in Public Crisis, Xiaoxia Zhu, Mengmeng Liu and Haiju Hu (pp. 439-446).