IJSIA Vol. 11, No. 12, 2017
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017
Vol.11, No.9, 2017
Vol.11, No.10, 2017
Vol.11, No.11, 2017
Vol.11, No.12, 2017
Vol.12, No.1, 2018
Vol.12, No.2, 2018

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • Security and Trust in Cloud Computing: A Survey, Fatmeh Sedaghat, Majid Haghparast and Mehrdad Maeen (pp. 1-14).
  • Enhancement of Cloud Security using DNA Inspired Multifold Cryptographic Technique, Manreet Sohal and Sandeep Sharma (pp. 15-26).
  • Security Solution for Secure Communication for Cross Layer Design in WSN, Rakesh Kumar Saini and Ritika (pp. 27-34).
  • Implementation of a Mobile Agent System to Detect DoS/DDoS Flooding Attacks in Cloud Computing, Abdelali Saidi, Elmehdi Bendriss and Mohamed El Marraki (pp. 35-44).
  • ISPAS: An Intelligent, Smart Parking Allotment System for Travelling Vehicles in Urban Areas, Amit Kumar Tyagi and Sreenath Niladhuri (pp. 45-64).
  • Menger Curvature Based 3D Printing Watermarking Algorithm, Giao N. Pham, Suk-Hwan Lee, Eung-Joo Lee and Ki-Ryong Kwon(pp. 65-78).
  • Searchable Encryption: A Review, Khadijah Chamili, Md. Jan Nordin, Waidah Ismail and Abduljalil Radman (pp. 79-88).
  • Bibliography



 
____________________________________________