IJSIA Vol. 11, No. 7, 2017
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • Smart System for Forest Fire Using Sensor Network, Ahmad AA Alkhatib, Mohammad Alia and Adnan Hnaif (pp. 1-16).
  • Introducing Quantum Cryptography Based Secured Encryption and Decryption Algorithms, V. Padmavathi, B. Vishnu Vardhan and A. V. N. Krishna (pp. 17-24).
  • Attacking HTTPS Secure Search Service through Correlation Analysis of HTTP Webpages Accessed, Qian Liping and Wang Lidong (pp. 25-42).
  • A Searchable Encryption Scheme in a Multi-user Setting for Cloud Storage, Qingqing Gan and Xiaoming Wang (pp. 43-58).
  • Reliable and Enhanced Third Party Auditing in Cloud Server Data Storage, Nitin Nagar and Ugrasen Suman (pp. 59-72).
  • Region-based Active Contour Segmentation Model with Local Discriminant Criterion, F.Z. Zhao, H.Y. Liang, X.L.Wu and D.H. Ding (pp. 73-86).
  • Information Security Content Development for Awareness Training Programs in Healthcare, Arash Ghazvini and Zarina Shukur (pp. 87-96).
  • Bibliography



 
____________________________________________