Skip to content
NADIA

IJSIA Vol. 9, No. 8, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 8, 2015 August
    • Secure Similarity Search over Encrypted Cloud Images, Yi Zhu, Xingming Sun, Zhihua Xia and Naixue Xiong (pp. 1-14).
    • Tangramrine: A Novel Graphical Recognition and Cued-recall based Password System, Steven Altamirano, Jesú s Zanelli, Juan M. Gutiérrez Cárdenas and Daniela Bringas (pp. 15-22).
    • Safeness Discussions on TRBAC and GTRBAC Model and an Improved Temporal Role-Based Access Control Model, Meng Liu and Xuan Wang (pp. 23-34).
    • Personalized Context-aware Recommendation Approach for Web Services, Zhang Xue-Jie, Wang Zhi-Jianand Zhang Wei-Jiang (pp. 35-44).
    • Security and Usability Improvement on a Digital Door Lock System based on Internet of Things, Ilkyu Ha (pp. 45-54).
    • Rocket Safety Control Intelligent Decision System, Li Ya, Zhang Jian-xun and Xiao Zhao-hui (pp. 55-66).
    • An In-depth Analysis of Various Steganography Techniques, Sangeeta Dhall, Bharat Bhushan and Shailender Gupta (pp. 67-94).
    • ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds, Liang-Ao Zhang, Xingming Sun, Zhihua Xia and Qiuju Ji (pp. 95-110).
    • A Novel Ant Colony Optimization Algorithm for QoS-Based Multicast Trusted Routing in Wireless Ad Hoc Networks, Hui Xia, Xiu-qing Lu and Zhen-kuan Pan (pp. 111-126).
    • Design and Development of a Command-line Tool for Portable Executable File Analysis and Malware Detection in IoT Devices, June Ho Yang and Yeonseung Ryu (pp. 127-136).
    • Probabilistic Load Flow Calculation Method of Containing Wind Farm Considering Grid Configuration Uncertainties, Hongsheng Su and Yan Yan (pp. 137-152).
    • A Study on Optimized Watermarking Scheme for MPEG-4 Contents Services on Mobile Device, Dae-Jea Cho (pp. 153-164).
    • Enhance Safety of Telecare Medicine Information System With A RFID-based Authentication Scheme, He Jialiang, Xu Zhiqiang and Xu Xiaoke (pp. 165-174).
    • An Improved Cyclic Feature Spectrum Detection Algorithm in CR Systems, Guicai Yu, Chengzhi Long and Mantian Xiang (pp. 175-186).
    • A Study on the Development of the Emergent System Recovery in an Effective Way from Hacking Attacks or Security Incidents, Jeongbeom Kim (pp. 187-194).
    • Sensitive-resisting Relation Social Network Privacy Protection Model, Han Yan (pp. 195-204).
    • A Dependency analysis for Information Security and Risk Management, B. Chaitanya Krishna, Kodukula Subrahmanyam and Tai-hoon Kim (pp. 205-209).
    • An Improved HB+ Protocol and its Application to EPC Global Class-1 Gen-2 Tags, Zhicai Shi, Jian Dai, Fei Wu, Yongxiang Xia, Yihan Wang and Changzhi Wang (pp. 210-220).
    • An API Calls Monitoring-based Method for Effectively Detecting Malicious Repackaged Applications, Wenhao Fan, Yuan’an Liu and Bihua Tang (pp. 221-230).
    • A Study on Audit Information Systems Improved Model based on Public Internal Audit Paradigm Shift, Jong-Suk Park, Young-Chul Oh, Jae-Gon Yoo, Yongtae Shin and Jong-Bae Kim (pp. 231-242).
    • Construction Scheme of NSFC Open Access Library, Jianjun Li, Minshe Zhang, Dong Li, Wei Zhang and Jin Wang (pp. 243-252).
    • Prototype Design of Mobile Micro-payment to Enhance Security by 2 Factor Authentication, Byung-Rae Cha, Sang-Hun Lee, Soo-Bong Park, Gun-Ki Lee and Yoo-Kang Ji (pp. 253-260).
    • Quantitative Analysis Methodology of Non-deterministic Causal Relationship in Risk Analysis, Dewang Ren and Wei Zheng (pp. 261-274).
    • A Hybrid approach for Camera-Model Detection, Shang Gao (pp. 275-282).
    • Extraction Security Indexing Value to use Story-Telling and Attribute-Based Encryption Scheme considering on Big Data Environment, You-jin Song and Jang-mook Kang (pp. 283-292).
    • Fundamental Two-Party Quantum Secret Sharing Protocol without Quantum Entanglement, Jun-Cheol Jeon (pp. 293-302).
    • Impact Evaluation of Distributed Denial of Service Attacks using NS2, Raghav Vadehra, Nitika Chowdhary and Jyoteesh Malhotra (pp. 303-316).
    • Study on Fuzzy Catastrophe Risk Model Based on Fuzzy Theory, Xiaoxia Zhu (pp. 317-322).
    • Multi-domain Security Authentication Protocol for Hybrid Cloud, Zhang Qikun, Zhang Lei, Gan Yong, Duan zhaolei and Zheng Jun (pp. 323-336).
    • A Study on a Secure Profile Model for Home Network in Cyber-Physical System, Hoon Ko, Libor Mesicek and Kitae Bae, Goreti Marreiros, Haengkon Kim, Hyun Yoe and Carlos Ramos (pp. 337-346).
    • Printed Document Authentication Using Two-Dimensional (2D) Barcodes and Image Processing Techniques, Mohammed AL-Gawda, Zou Beijiand Nurudeen Mohammed (pp. 347-366).
    • Enhanced User Authentication Scheme for Wireless Sensor Networks, Hee-Joo Park (pp. 367-374).
    • Research on Factors Affecting Employees Security Behavior Based on Structural Equation Model, Yanna Zhu, Gang He, Xianfei Zhu, Guotong Qiao, Guisheng Zhang and Lianwei Heng (pp. 375-384).
    • Evolution Mechanism of Information Industry Ecological Security, Xiaolan Guan, Menggang Li and Shugang Zhang (pp. 385-396).
    • Leveraging Certificate-less Public Key Cryptosystem for Node ID Assignment in Structured P2P Systems, Dengqi Yang, Jian Yang and Benhui Chen (pp. 397-408).
    • A Seamless Constraint Model of Multi-Scale Representation of Geographical Information, Di Chen, Han Yue and Xinyan Zhu (pp. 409-416).
    • Timing-reliable Design of High-speed TigerSHARC 201 Link Transceiver, Peng Wang, Ke Gong, You-chao Tu, Xiao-li Zhang and Xin-wu Chen (pp. 417-426).
    • Heuristic Grid Resource Scheduling Algorithm based on Group of Task and Secondary Distribution, Zhongping Zhang, Yupeng Feng, Shan Zhang and Ying Sun (pp. 427-438).
    • The Dynamic Replication Mechanism of HDFS Hot File based on Cloud Storage, Mingyong Li, Yan Ma and Meilian Chen (pp. 439-448).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA