2019 Issues Vol. 13, No. 3 Vol. 13, No. 2 Vol. 13, No. 1 2018 Issues Vol. 12, No. 6 Vol. 12, No. 5 Vol. 12, No. 4 Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2017 Issues Vol. 11, No. 12 Vol. 11, No. 11 Vol. 11, No. 10 Vol. 11, No. 9 Vol. 11, No. 8 Vol. 11, No. 7 Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2016 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2015 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2014 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2013 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2012 Issues Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2011 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2010 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2009 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2008 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2007 Issues Vol. 1, No. 2 Vol. 1, No. 1 2015 2015 Volume 9, Number 8, 2015 August Secure Similarity Search over Encrypted Cloud Images, Yi Zhu, Xingming Sun, Zhihua Xia and Naixue Xiong (pp. 1-14). Tangramrine: A Novel Graphical Recognition and Cued-recall based Password System, Steven Altamirano, Jesú s Zanelli, Juan M. Gutiérrez Cárdenas and Daniela Bringas (pp. 15-22). Safeness Discussions on TRBAC and GTRBAC Model and an Improved Temporal Role-Based Access Control Model, Meng Liu and Xuan Wang (pp. 23-34). Personalized Context-aware Recommendation Approach for Web Services, Zhang Xue-Jie, Wang Zhi-Jianand Zhang Wei-Jiang (pp. 35-44). Security and Usability Improvement on a Digital Door Lock System based on Internet of Things, Ilkyu Ha (pp. 45-54). Rocket Safety Control Intelligent Decision System, Li Ya, Zhang Jian-xun and Xiao Zhao-hui (pp. 55-66). An In-depth Analysis of Various Steganography Techniques, Sangeeta Dhall, Bharat Bhushan and Shailender Gupta (pp. 67-94). ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds, Liang-Ao Zhang, Xingming Sun, Zhihua Xia and Qiuju Ji (pp. 95-110). A Novel Ant Colony Optimization Algorithm for QoS-Based Multicast Trusted Routing in Wireless Ad Hoc Networks, Hui Xia, Xiu-qing Lu and Zhen-kuan Pan (pp. 111-126). Design and Development of a Command-line Tool for Portable Executable File Analysis and Malware Detection in IoT Devices, June Ho Yang and Yeonseung Ryu (pp. 127-136). Probabilistic Load Flow Calculation Method of Containing Wind Farm Considering Grid Configuration Uncertainties, Hongsheng Su and Yan Yan (pp. 137-152). A Study on Optimized Watermarking Scheme for MPEG-4 Contents Services on Mobile Device, Dae-Jea Cho (pp. 153-164). Enhance Safety of Telecare Medicine Information System With A RFID-based Authentication Scheme, He Jialiang, Xu Zhiqiang and Xu Xiaoke (pp. 165-174). An Improved Cyclic Feature Spectrum Detection Algorithm in CR Systems, Guicai Yu, Chengzhi Long and Mantian Xiang (pp. 175-186). A Study on the Development of the Emergent System Recovery in an Effective Way from Hacking Attacks or Security Incidents, Jeongbeom Kim (pp. 187-194). Sensitive-resisting Relation Social Network Privacy Protection Model, Han Yan (pp. 195-204). A Dependency analysis for Information Security and Risk Management, B. Chaitanya Krishna, Kodukula Subrahmanyam and Tai-hoon Kim (pp. 205-209). An Improved HB+ Protocol and its Application to EPC Global Class-1 Gen-2 Tags, Zhicai Shi, Jian Dai, Fei Wu, Yongxiang Xia, Yihan Wang and Changzhi Wang (pp. 210-220). An API Calls Monitoring-based Method for Effectively Detecting Malicious Repackaged Applications, Wenhao Fan, Yuan’an Liu and Bihua Tang (pp. 221-230). A Study on Audit Information Systems Improved Model based on Public Internal Audit Paradigm Shift, Jong-Suk Park, Young-Chul Oh, Jae-Gon Yoo, Yongtae Shin and Jong-Bae Kim (pp. 231-242). Construction Scheme of NSFC Open Access Library, Jianjun Li, Minshe Zhang, Dong Li, Wei Zhang and Jin Wang (pp. 243-252). Prototype Design of Mobile Micro-payment to Enhance Security by 2 Factor Authentication, Byung-Rae Cha, Sang-Hun Lee, Soo-Bong Park, Gun-Ki Lee and Yoo-Kang Ji (pp. 253-260). Quantitative Analysis Methodology of Non-deterministic Causal Relationship in Risk Analysis, Dewang Ren and Wei Zheng (pp. 261-274). A Hybrid approach for Camera-Model Detection, Shang Gao (pp. 275-282). Extraction Security Indexing Value to use Story-Telling and Attribute-Based Encryption Scheme considering on Big Data Environment, You-jin Song and Jang-mook Kang (pp. 283-292). Fundamental Two-Party Quantum Secret Sharing Protocol without Quantum Entanglement, Jun-Cheol Jeon (pp. 293-302). Impact Evaluation of Distributed Denial of Service Attacks using NS2, Raghav Vadehra, Nitika Chowdhary and Jyoteesh Malhotra (pp. 303-316). Study on Fuzzy Catastrophe Risk Model Based on Fuzzy Theory, Xiaoxia Zhu (pp. 317-322). Multi-domain Security Authentication Protocol for Hybrid Cloud, Zhang Qikun, Zhang Lei, Gan Yong, Duan zhaolei and Zheng Jun (pp. 323-336). A Study on a Secure Profile Model for Home Network in Cyber-Physical System, Hoon Ko, Libor Mesicek and Kitae Bae, Goreti Marreiros, Haengkon Kim, Hyun Yoe and Carlos Ramos (pp. 337-346). Printed Document Authentication Using Two-Dimensional (2D) Barcodes and Image Processing Techniques, Mohammed AL-Gawda, Zou Beijiand Nurudeen Mohammed (pp. 347-366). Enhanced User Authentication Scheme for Wireless Sensor Networks, Hee-Joo Park (pp. 367-374). Research on Factors Affecting Employees Security Behavior Based on Structural Equation Model, Yanna Zhu, Gang He, Xianfei Zhu, Guotong Qiao, Guisheng Zhang and Lianwei Heng (pp. 375-384). Evolution Mechanism of Information Industry Ecological Security, Xiaolan Guan, Menggang Li and Shugang Zhang (pp. 385-396). Leveraging Certificate-less Public Key Cryptosystem for Node ID Assignment in Structured P2P Systems, Dengqi Yang, Jian Yang and Benhui Chen (pp. 397-408). A Seamless Constraint Model of Multi-Scale Representation of Geographical Information, Di Chen, Han Yue and Xinyan Zhu (pp. 409-416). Timing-reliable Design of High-speed TigerSHARC 201 Link Transceiver, Peng Wang, Ke Gong, You-chao Tu, Xiao-li Zhang and Xin-wu Chen (pp. 417-426). Heuristic Grid Resource Scheduling Algorithm based on Group of Task and Secondary Distribution, Zhongping Zhang, Yupeng Feng, Shan Zhang and Ying Sun (pp. 427-438). The Dynamic Replication Mechanism of HDFS Hot File based on Cloud Storage, Mingyong Li, Yan Ma and Meilian Chen (pp. 439-448).