Skip to content
NADIA

IJSIA Vol. 9, No. 5, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 5, 2015 May
    • Security Model for Sensitive Information Systems and Its Applications in Sensor Networks, Tianbo Lu, Xiaobo Guo, Lingling Zhao, Yang Li, Peng Lin and Binxing Fang (pp. 1-18).
    • Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization, Hind Idrissi, El Mamoun Souidi and Arnaud Revel (pp. 19-30).
    • Service Dynamic Trust Evaluation Model based on Bayesian Network in Distributed Computing Environment, Libin Wang, Xiangjun Li, Xinquan Yan, Song Qing and Yuanlu Chen (pp. 31-42).
    • Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment, LI Feng-Quan (pp. 43-54).
    • The RC7 Encryption Algorithm, Rashmi, Vicky Chawla and Rajni Sehgal Renuka Nagpal (pp. 55-60).
    • Secure Data Sanitization for Android Device Users, Na Huang, Jingsha He and Bin Zhao (pp. 61-68).
    • Intrusion Detection System: A Review, Sanjay Sharma and R. K. Gupta (pp. 69-76).
    • A Proxy-Based Data Security Solution in Mobile Cloud, Xiaojun Yu and Qiaoyan Wen (pp. 77-84).
    • A Secure and Fault Tolerant Platform for Mobile Agent Systems, Rajdeep Bhanot1 and Rahul Hans (pp. 85-94).
    • Research on Trustiness of Software Behavior Based on Cross-References, Wei Liu, Linlin Ci and Liping Liu (pp. 95-104).
    • An Eyelid Detection Algorithm for the Iris Recognition, Pengfei Cai and Chongke Wang (pp. 105-112).
    • Implementation of Privacy-Enhanced SMS Provider on the Android Platform, Min-woo Park, Jung ho Eom and Tai-Myoung Chung (pp. 113-122).
    • A Multi-dimensional Evidence-based Trust Evaluation Model and Algorithm, Wenbao Jiang, Qijing Li and Wenliang Chen (pp. 123-132).
    • Research on Encryption Key Extraction From Iris Feature, Wei Hao and Yong Wei (pp. 133-140).
    • Desktop Computer Virtualization for Improvement Security, Power Consumption and Cost by SBC (Server Based Computer), Lee Yong Hui, Kim Hwan Seok and Kim Baek Ki (pp. 141-152).
    • The Research and Application of Multi-Firewall Technology in Enterprise Network Security, Jing Li (pp. 153-162).
    • Security Assessment by Google Hacking Automation Tools for the Web Sites of Korea and the USA Universities, Mi Young Bae and Hankyu Lim (pp. 163-174).
    • Face Recognition Algorithm Based on Improved BP Neural Network, Li Yong-Qiang (pp. 175-184).
    • Exploiting User Behavior Changes in Privacy Disclosure by Modified Clustering Technique, Hongchen Wu, Xinjun Wang, Zhaohui Peng and Qingzhong Li (pp. 185-194).
    • Efficient Database Encryption Scheme for Database-as-a-Service Environment, Hankyu Joo (pp. 195-204).
    • A Hybrid Malicious Code Detection Method based on Deep Learning, Yuancheng Li, Rong Ma and Runhai Jiao (pp. 205-216).
    • Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks, Solomon Sarpong and Chunxiang Xu (pp. 217-230).
    • Evaluating the Cooperation Risk between Rural Tourism and Third-Party Network Platform by Using Confirmatory Factor Analysis, Hui Song (pp. 231-242).
    • Image Steganography via Fully Exploiting Modification Direction, Xuejing Niu, Meng Ma, Rui Tang and Zhaoxia Yins (pp. 243-254).
    • An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic Identity, Yajuan Shi, Han Shen, Yuanyuan Zhang and Jianhua Chen (pp. 255-268).
    • User Authentication System using Visual Communication, Byung-Hun Oh, Kyung-Won Chang and Kwang-Seok Hong (pp. 269-278).
    • Research for Two-way Real-name Authentication Unified Platform of C2C E-commerce Based on DNS, Xiaotang Li (pp. 279-288).
    • The Research on Influence Factors of the Servitization of the Equipment Manufacturing Industry under the Global Value Chain (GVC) Perspective, Xiaowei Xu Xueyuan Wang and Rui Zhang (pp. 289-296).
    • Development of Human Identification System Based on Simple Finger-Vein Pattern-Matching Method for Embedded Environments, Kuk Won Ko, Jiyeon Lee, Mehrdad Ahmadi and Sangjoon Lee (pp. 297-306).
    • Study on Fault Prediction of Equipments Based on Extension Theory, Ti-chun Wang, Xiao-yi Chen, Shi-sheng Zhong and Yong-jian Zhang (pp. 307-318).
    • Homomorphic Encryption for Cluster in Cloud, N. Vamshinath, K. Ruth Ramya, Sai Krishna, P. Gopi Bhaskar, Geofrey L. Mwaseba and Tai-hoon Kim (pp. 319-324).
    • A Monitoring Algorithm Based on IP Address Statistics in DCS Isolation Device, Yongguang Ma and Zhiyu Ye (pp. 325-334).
    • Complex Background Palm Segmentation using SVM, Gao Peng and Li Liang (pp. 335-344).
    • A Bitmap based Data Encryption Scheme in Cloud Computing, Min Yoon, Miyoung Jang, Young-Sung Shin and Jae-Woo Chang (pp. 345-360).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA