Skip to content
NADIA

IJSIA Vol. 9, No. 9, 2015

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 13, No. 3
Vol. 13, No. 2
Vol. 13, No. 1
2018 Issues
Vol. 12, No. 6
Vol. 12, No. 5
Vol. 12, No. 4
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2017 Issues
Vol. 11, No. 12
Vol. 11, No. 11
Vol. 11, No. 10
Vol. 11, No. 9
Vol. 11, No. 8
Vol. 11, No. 7
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2016 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2015 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2014 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2013 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2012 Issues
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2011 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2010 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2009 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2008 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2007 Issues
Vol. 1, No. 2
Vol. 1, No. 1
2015
2015
Volume 9, Number 9, 2015 September
    • Prison Identification Technology Research Based on Iris Image Recognition, Lv Hanfei and Jiang Congfeng (pp. 1-8).
    • A Study on Service Architecture for Secure Authentication System, Sung Jin Kim, Myung Chul Ma, Hyeon-Kyung Lee and Jong-Bae Kim (pp. 9-20).
    • Public Data Auditing with Constrained Auditing Number for Cloud Storage, Guangyang Yang, Hui Xia, Wenting Shen, Xiuxiu Jiang and Jia Yu (pp. 21-32).
    • Malicious URL Detection Algorithm based on BM Pattern Matching, Fuqiang Yu (pp. 33-44).
    • Design of a Robust Normal Distribution Sampler for Ring-Learning-With-Errors Cryptographic Scheme, Sangook Moon (pp. 45-54).
    • Research on Dynamic Trust Computing Method Based on Multi-Dimensional Evidence, Shi DeJia, Jiang WeiJin and Zhang Lian Mei (pp. 55-64).
    • A Novel SINS/CNS Integrated Navigation Algorithm used in a Ballistic Missile, Lihua Yang, Baolin Li and Lei Ge (pp. 65-76).
    • A Case Study on Converged Security with Event Correlation of Physical and Information Security, Koohong Kang and Jinoh Kim (pp. 77-94).
    • Technique for Intrusion Detection based on Cutting-based Real-valued Negative Selection, Niu Ling, Feng Gao Feng and Ma Jing (pp. 95-104).
    • An Ethical Approach of Block Based Image Encryption Using Chaotic Map, Kamlesh Gupta, Ranu Gupta, Rohit Agrawaland Saba Khan (pp. 105-122).
    • Detection and Prevention to Network Worm Virus Based on Segmentation Algorithm, Yuqi Tang (pp. 123-130).
    • Faithful Quantum Secure Communication with Authentication based on Bell States and Classical XOR Resisting Collective Noise, Tao Fang and Min Li (pp. 131-140).
    • Comparative Analysis of Offline Signature Verification System, Deepti Yadav and Ranbeer Tyagi (pp. 141-150).
    • An Improved ID-based Proxy Signature Scheme with Message Recovery, Caixue Zhou (pp. 151-164).
    • Fast Three-Input Multipliers over Small Composite Fields for Multivariate Public Key Cryptography, Haibo Yi and Weijian Li (pp. 165-178).
    • Ice Disaster Prevention Measure Optimization Model, Hui Hou, Yuan-sheng Li, Joe Dong, Ning Lu and Ai-hong Tang (pp. 179-188).
    • Fault Analysis in Software with the Data Interaction of Classes, Yan Xiaobo and Wang Yichen (pp. 189-196).
    • Chaotic Theory based Defensive Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment, N. Ch. S. N. Iyengar and Gopinath Ganapathy (pp. 197-212).
    • A New Method of Fingerprints Singular Points Detection, Zhang Zhe, Liang Yuanyuan and Liu Xiangjiao (pp. 213-224).
    • Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review, Leila Mohammadpour, Mehdi Hussain, Alihossein Aryanfar, Vahid Maleki Raee and Fahad Sattar (pp. 225-242).
    • A Novel Architecture for Cognitive Internet of Things, Mingchuan Zhang, Yong Qiu, Ruijuang Zheng, Xiuling Bai, Wangyang Wei and Qingtao Wu (pp. 243-252).
    • Quantum Public-key Cryptosystem without Quantum Channels between Any Two Users using Non-orthogonal States, Xiaoyu Li and Yuwen Chen (pp. 253-264).
    • Two Way Authentication in MITM Attack to Enhance Security of E-commerce Transactions, Rupali Savita and Unmukh Datta (pp. 265-274).
    • Research on Intrusion Detection Algorithm of User Data based on Cloud Computing, Zhang Hongdong and Song Yuli (pp. 275-284).
    • A Kind of Encryption Method of QR Code based on ECA State Ring, Yu Guang, Shi Yunbo and Che Chang (pp. 285-294).
    • A Genetic Algorithm Approach for Breaking of Simplified Data Encryption Standard, Farah Al Adwan, Mohammad Al Shraideh and Mohammed Rasol Saleem Al Saidat (pp. 295-304).
    • Digital Watermark of 3D CAD Product Model, Xiaoqing Feng, Yanan Liu and Lincong Fang (pp. 305-320).
    • Intrusion Detection System based on Hidden Conditional Random Fields, Jun Luo and Zenghui Gao (pp. 321-336).
    • Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles, Jun Jie Qiu, Jung Bok Jo and Hoon Jae Lee (pp. 337-344).
    • Information Industry Security: An Ecological Point of View, Menggang Li and Xiaolan Guan (pp. 345-358).
    • Network Intrusion Detection System Model Based On Artificial Immune, Zhang Yanbin (pp. 359-370).
    • Cyber Attack Detection System based on Improved Support Vector Machine, Shailendra Singh and Sanjay Silakari (pp. 371-387).
    • Non-deterministic K-anonymity Algorithm Based Untrusted Third Party for Location Privacy Protection in LBS, Jinying Jia and Fengli Zhang (pp. 387-400).
    • Research on Operation Performance of Women Oriented Cross-country Teaching in College: an Empirical Analysis Based on Multimedia Computer, Luo Hong, Long Xiaodong, Tao Ganchen, Long Jianjun, Wan Shaoyong and Chen Yuanping (pp. 401-412).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA