IJSIA Vol. 11, No. 3, 2017
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • A Social Popularity Based Probabilistic Routing in Delay Tolerant Network, Jianbo Li, Youmei Song and Shan Jiang (pp. 1-16).
  • Data Encryption using Advanced Encryption Standard with Key Generation by Elliptic Curve Diffie-Hellman, Samiksha Sharma and Vinay Chopra (pp. 17-28).
  • Dynamic Analysis on the Volatility of China Stock Market Based on CSI 300: A Financial Security Perspective, Xiongbing Chen and Ning Zhang (pp. 29-38).
  • Technique to Generate Variable Keys with Key Variation with Noise Burst Bit for Achieving Perfect Security in Cryptology towards Optimum Data Transfer, Moumita Das, Rajat Subhra Goswami, Manash P Dutta, S. K. Chakraborty and C. T. Bunia (pp. 39-50).
  • Empirical Research on Network Size and Technological Progress, Yabin Zhang, Qiang Chen and Tianli Xiong (pp. 51-60).
  • An Approach to Generate Variable Keys based on Vertical Horizontal Mechanism, Chukhu Chunka, Rajat Subhra Goswami, Subhasish Banerjee and Chandan T Bhunia (pp. 61-70).
  • An Efficient Cloud-Assisted Message Authentication Scheme in Wireless Body Area Network, Huaijin Liu and Yonghong Chen (pp. 71-80).
  • Automatic Extract Clone Genealogy to Analysis Software Evolution Process, Chen Zhuo, Zhang Li-ping and Hou Min (pp. 81-94).
  • Securing the Security System, Sabah Al-Fedaghi (pp. 95-108).
  • Bibliography



 
____________________________________________