Skip to content
NADIA

IJSIA Vol. 9, No. 6, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 6, 2015 June
    • On the Building Countermeasures of Content Bank Based on Digital Content Industry, Han Ping, Tao Zhong and Liu Xiao-lu (pp. 1-10).
    • Securing Embedded Systems from Power Analysis Attack, Deevi Radha Rani, S. Venkateswarlu, Venkata Naresh Mandhala and Tai-hoon Kim (pp. 11-18).
    • Epidemic Model based Security Analysis of Firefly Clock Synchronization in Wireless Sensor Networks, Zhiling Tang and Simin Li (pp. 19-34).
    • Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm, Jingjing Yang, Yuanqiang Wang and Xiao Zhang (pp. 35-42).
    • Energy Efficient, Integrity Preserving and Secure Data Aggregation Technique for Wireless Sensor Network, Shrijana Pradhan and Kalpana Sharma (pp. 43-52).
    • Fast Authentication Method for Wireless Local Area Network, Guo Hong-tao (pp. 53-60).
    • Hybrid Homomorphic Encryption Method for Protecting the Privacy of Banking Data in the Cloud, Maha Tebaa, Karim Zkik and Said El Hajji (pp. 61-70).
    • Minutiae-based Triangular Acreage Fingerprint Match Method, Gang Wang, Dan Zhao and Xiaoyu Sun (pp. 71-78).
    • Design and Implementation about Secure Smart Electricity Meter Sealing Based on RF Tag, Zhenliu Zhou (pp. 79-88).
    • Reliable and Secure Routing ADHOC Algorithm Based on Collaborative Monitor Nodes in VANETS, SunYuezhongyi (pp. 89-100).
    • Research on Application of Hierarchical Trust Mechanism in Internet of Things, Deng Xian-Rui, Mu Jingqin and Wei Ping (pp. 101-114).
    • An Improved User-Participating Authentication Scheme, Huang Shi, Tianjie Cao and Gao Caiyun (pp. 115-124).
    • EEG-based Safety Driving Performance Estimation and Alertness Using Support Vector Machine, Wenbao Jiang, Qijing Li and Wenliang Chen (pp. 125-134).
    • An Efficient Key Predistribution Protocol for Wireless Sensor Networks via Combinatorial Design, Jianmin Zhang, Xuerui Wang and Jian Li (pp. 135-146).
    • A Chebyshev-Map Based One-Way Authentication and Key Agreement Scheme for Multi-Server Environment, Zengyu Cai, Yuan Feng, Junsong Zhang, Yong Gan and Qikun Zhang (pp. 147-156).
    • Image Encryption Research based on Key Extracted from Iris Feature, RuiYun Xie, MingFei Wang and BenZhai Hai (pp. 157-166).
    • Extract Function Clone Genealogies across Multiple Versions, Tu Ying, Zhang Li-ping, Wang Chun-Hui and Liu Dong-sheng (pp. 167-182).
    • New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System, D. Rajagopal, K. Thilakavalli and K. Syed Ali Fathima (pp. 183-194).
    • Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol, Haiyan Liu and Zhanlei Shang (pp. 195-208).
    • Research on the Authentication of Radio Frequency Identification based on the Hash function, Bai Zhi and He Yi-Gang (pp. 209-216).
    • A Study on the Development of Next Generation Intelligent Integrated Security Management Model using Big Data Technology, JeongBeom Kim (pp. 217-226).
    • Anomaly-based Intrusion Detection using Multiclass-SVM with Parameters Optimized by PSO, Gui Ping Wang, Shu Yu Chen and Jun Liu (pp. 227-242).
    • Wearable Device in Security, Jo Sung-Gu (pp. 243-250).
    • A Half-Dynamic Classification Method on Obfuscated Malicious JavaScript Detection, Zhaolin Fang, Renhuan Zhu, Weihui Zhang and Bo Chen (pp. 251-262).
    • Cohort Selection of Specific User Using Max-Min-Centroid-Cluster (MMCC) Method to Enhance the Performance of a Biometric System, Jogendra Garain, Ravi Kant Kumar, Goutam Sanyal and Dakshina Ranjan Kisku (pp. 263-270).
    • Thermal aware Internet of Things Enable Energy Efficient Encoder Design for Security on FPGA, Deepa Singh, Kanika Garg, Ravneet Singh, Bishwajeet Pandey, Kartik Kalia and Hasmatullah Noori (pp. 271-278).
    • An Adaptive Multi-Layer Block Data-Hiding Algorithm that uses Edge Areas of Gray-Scale Images, Tuan Duc Nguyen, Somjit Arch-int and Ngamnij Arch-int (pp. 279-298).
    • Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence, Yudi Prayudi and Tri K Priyambodo (pp. 299-314).
    • A Novel Authentication Scheme for Lossy Compressed Images, Mona A. M. Fouad and Ahmed Mokhtar A. Mansour (pp. 315-328).
    • Research on Robust Adaptive and Efficient Control System: A Theoretical Approach, Fengling Yin and Bingquan Huo (pp. 329-340).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA