IJSIA Vol. 11, No. 2, 2017
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • A Novel Remote Authentication Scheme with Smart Cards Based On Chaotic Maps, Kai Chain, Wen-Chung Kuo and Jar-Ferr Yang (pp. 1-14).
  • Development of an Intelligent Intruder Alert System, Oyelakin K. Akinloye and Egbuwalo Shadrack A. (pp. 15-24).
  • An Optimized Clustering Algorithm based on Integration of Genetic Algorithm and Ant Colony Algorithm, Shucheng Xiao, Shanjing Chen, Shan Qiu, Zhendong Yang, Juan Xu, Jinlan Qiao, Saixuan Yu (pp. 25-32).
  • Diversified Caesar Cipher for Impeccable Security, Priya Verma, Gurjot Singh Gaba, Rajan Miglani (pp. 33-40).
  • Secure and Efficient SOS-based Workflow Scheduling in Cloud Computing, Moazam Bidaki, Seyed Reza Kamel Tabbakh, M.Yaghoobi, Hassan Shakeri (pp. 41-58).
  • Enhancing the Security of Communication Using Encryption Algorithm Based on ASCII Values of Data, Farheen Qazi, Fozia Hanif Khan, Khurram Nawaz Kiani, Shakil Ahmed, Sadiq Ali Khan (pp. 59-68).
  • Internet and the New Media: Predator of Indonesian News Agency, Rajab Ritonga, Meiliyah Ariani, and Tutut Herawan (pp. 69-86).
  • Bibliography



 
____________________________________________