


default search action
International Journal of Network Security, Volume 22
Volume 22, Number 1, January 2020
- Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, Xiangmin Guo:

Packet Watermarking With ECG Biological Feature. 1-11 - Jia-Qi Wang, Yun-Feng Zhang, Daowei Liu:

Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce. 12-23 - Hua Ma, Guohua Tian, Linchao Zhang:

Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing. 24-35 - Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen:

A Note On One Secure Data Self-Destructing Scheme In Cloud Computing. 36-40 - Shahrzad Sedaghat:

The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks. 41-53 - Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, Yan Xiong:

A Formal Framework of Shielding Systems by Stepwise Refinement. 54-67 - Hui Tian, Zhao-Hua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:

StegoNote: Steganography in Guitar Music Using Note Modulation. 68-79 - Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, Bo Meng:

Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model. 80-92 - Budi Gunawan, Barito Mulyo Ratmono:

Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace. 93-101 - Hui Guo, Lunzhi Deng:

Certificateless Ring Signcryption Scheme from Pairings. 102-111 - Lin Teng, Hang Li, Shoulin Yin, Yang Sun:

A Modified Advanced Encryption Standard for Data Security. 112-117 - Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon:

Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey. 118-125 - Xiaofeng Chen, Wenlong Guo:

Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images. 126-135 - Ying-Chih Tseng, Heng Ma:

A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information. 136-144 - Jing Chen, Feng Zhao, Haiyan Xing:

Research on Security of Mobile Communication Information Transmission Based on Heterogeneous Network. 145-149 - Shidong Zhang, Tongjiang Yan, Yuhua Sun, Lianhai Wang:

Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation. 150-154 - Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, Yang Sun:

An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain. 155-160 - Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu:

Attribute Based Encryption with Efficient Revocation from Lattices. 161-170 - Zepeng Zhuo, Jinfeng Chong, Lei Yu:

Correlation Functions of m-Sequences of Different Lengths. 171-176 - Xiaoyi Hong:

Network Security Situation Prediction Based on Grey Relational Analysis and Support Vector Machine Algorithm. 177-182
Volume 22, Number 2, March 2020
- You-Jian Yu, Guang-Fu Wang, Jie Zhao:

FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks. 183-190 - Keke Wu, Bo Peng, Hua Xie, Shaobin Zhan:

A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks. 191-200 - Hui Xia, Weiji Yang:

Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone. 201-211 - Wei-Liang Tai, Ya-Fen Chang, Wen-Hsin Huang:

Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing. 212-217 - Rui-Hong Dong, Hou-Hua Yan, Qiu-Yu Zhang:

An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm. 218-230 - Emmanuel Mugabo, Qiu-Yu Zhang:

Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing. 231-241 - Yang Chen, Yonghong Chen:

A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis. 242-249 - Javad Saadatmandan, Amirhossein Rahimi:

A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat. 250-256 - Seth Alornyo, Yanan Zhao, Guobin Zhu, Hu Xiong:

Identity Based Key-Insulated Encryption with Outsourced Equality Test. 257-264 - Huijun Yao, Chaopeng Li, Peng Sun:

Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detection. 265-274 - Pengshou Xie, Xue-Ming Han, Tao Feng, Yan Yan, Guoqiang Ma:

A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles. 275-282 - Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, Elsayed M. Badr:

Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory. 283-295 - Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:

Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell. 296-305 - Yueyang Su, Jing Wan, Junkai Yi:

A PSO-based Wavelet-core ELM for Abnormal Flow Detection. 306-313 - Chu Zhao, Shoulin Yin, Hang Li, Yang Sun:

Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group. 314-320 - Ming Sang Chang, Chih Ping Yen:

LinkedIn Social Media Forensics on Windows 10. 321-330 - Zhengjun Cao, Zhen Chen, Ruizhong Wei, Lihua Liu:

Run-based Modular Reduction Method. 331-336 - Yuanquan Shi, Hong Shen:

Anomaly Detection for Network Flow Using Immune Network and Density Peak. 337-346 - Pengshou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guoqiang Ma, Xue-Ming Han:

Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk. 347-357 - Hsieh-Tsen Pan, Hung-Wei Yang, Min-Shiang Hwang:

An Enhanced Secure Smart Card-based Password Authentication Scheme. 358-363
Volume 22, Number 3, March 2020
- Jingyu Wang, Jingnan Dong, Yuesheng Tan:

Role Mining Algorithms Satisfied the Permission Cardinality Constraint. 373-382 - Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:

Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications. 383-393 - Jianhong Zhang, Wenle Bai, Zhengtao Jiang:

On the Security of a Practical Constant-Size Ring Signature Scheme. 394-398 - Syed Mohd Faisal, Taskeen Zaidi:

Timestamp Based Detection of Sybil Attack in VANET. 399-410 - Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:

Static Analysis of Superfluous Network Transmissions in Android Applications. 411-420 - Shoulin Yin, Jie Liu, Lin Teng:

Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption. 421-426 - Xu Zhao, Guangqiu Huang, Reza Mousoli:

A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm. 427-436 - Faisal Nabi, Jianming Yong, Xiaohui Tao:

A Novel Approach for Component based Application Logic Event Attack Modeling. 437-443 - Yang Liu, Mingxing He, Fangyuan Pu:

Anonymous Transaction of Digital Currency Based on Blockchain. 444-450 - Zheng-Zhi Tang, Xuewen Zeng, Zhichuan Guo, Mangu Song:

Malware Traffic Classification Based on Recurrence Quantification Analysis. 451-461 - Qianlong Dang, Hua Ma, Zhenhua Liu, Ying Xie:

Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage. 462-475 - Cungang Yang, Celia Li:

Design of Key Management Protocols for Internet of Things. 476-485 - Jing Bi, Shoulin Yin, Hang Li, Lin Teng, Chu Zhao:

Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems. 486-491 - Tao Wan, Xiaochang Liu, Weichuan Liao, Nan Jiang:

Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture. 492-503 - Ke Gu, Dianxing Liu, Bo Yin:

Efficient Group Signature Scheme without Pairings. 504-515 - Tanweer Alam:

Internet of Things: A Secure Cloud-based MANET Mobility Model. 516-522 - Hefeng Chen, Chin-Chen Chang, Kaimeng Chen:

Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem. 523-533 - Yuanyuan Xiao, Xiaoyao Xie:

Application of Novel Gabor-DCNN into RGB-D Face Recognition. 534-541 - Munawar Hussain, Jiadong Ren, Awais Akram:

Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network. 542-549
Volume 22, Number 4, July 2020
- Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:

Sharing a Secret Image in the Cloud Using Two Shadows. 551-560 - Hui Guo, Lunzhi Deng:

An Identity Based Proxy Signcryption Scheme without Pairings. 561-568 - Shuang-Gen Liu, Shi-Mei Lu, Rui-Wen Gong:

Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m). 569-574 - Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, Yanjun Liu:

A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding. 575-583 - Cai-xue Zhou:

Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System. 584-588 - Zhi-Ge He:

Multi-Parameter and Time Series Based Trust for IoT Smart Sensors. 589-596 - Qingfeng Cheng, Yuting Li, Qi Jiang, Xiong Li:

Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols. 597-601 - Alain Bertrand Bomgni, Garrik Brel Jagho Mdemaya:

An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks. 602-609 - Xiaolin Chen, Zhixiong Chen, Huaning Liu:

A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}. 610-620 - Tianhong Yang:

Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography. 621-626 - Changguang Wang, Zimeng Dai, Dongmei Zhao, Fangwei Wang:

A Novel Identity-based Authentication Scheme for IoV Security. 627-637 - Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, Pabel Miah:

A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms. 638-644 - Fuxiao Zhou, Yanping Li, Changlu Lin:

A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security. 645-654 - Pengshou Xie, Guoqiang Ma, Tao Feng, Yan Yan, Xue-Ming Han:

Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles. 655-663 - Yongshuang Wei, Jianhua Chen:

Tripartite Authentication Protocol RFID/NFC Based on ECC. 664-671 - Cungang Yang, Celia Li:

Secure Sharing of Data for Dynamic Group in Public Cloud. 672-680 - Zhengjun Cao, Xiqi Wang, Lihua Liu:

A Note on One Popular Non-Interactive Zero-Knowledge Proof System. 681-685 - Linfan Wang, Yonghong Chen:

A Perceptual Hash-based Approach to Detect Covert Timing Channels. 686-697 - Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, Dong Zheng:

An Efficient Mobile Location-based Service Framework for Resource-constrained Devices. 698-707 - Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang:

Research on the Secure Financial Surveillance Blockchain Systems. 708-716
Volume 22, Number 5, September 2020
- Li-Chin Huang, Chun-Hsien Chang, Min-Shiang Hwang:

Research on Malware Detection and Classification Based on Artificial Intelligence. 717-727 - Fei Tang, Dong Huang:

A BLS Signature Scheme from Multilinear Maps. 728-735 - Changsong Jiang, Yuhua Sun, Xueting Liang:

Eighth Power Residue Double Circulant Self-Dual Codes. 736-742 - Seth Alornyo, Acheampong Edward Mensah, Abraham Opanfo Abbam:

Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing. 743-751 - Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:

One-Code-Pass User Authentication Based on QR Code and Secret Sharing. 752-762 - Xiaoxu Gao, Leyou Zhang:

Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience. 763-774 - Lin Mei, Fengli Zhang:

A Distributed Density-based Outlier Detection Algorithm on Big Data. 775-781 - Jinyue Bian, Quan Qian:

Binary Executable Files Homology Detection with Genetic Algorithm. 782-792 - L. Mancy, S. Maria Celestin Vigila:

A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications. 793-800 - Shanshan Zhang:

A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation. 801-808 - Haiou Yang, Youliang Tian:

Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique. 809-814 - Li Kang, Leyou Zhang:

A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme. 815-827 - Ming Sang Chang, Chih Ping Yen:

Evidence Gathering of Facebook Messenger on Android. 828-837 - Jian Liu, Feilong Qin:

Protection of User Data by Differential Privacy Algorithms. 838-844 - Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:

Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System. 845-856 - Bin Wang:

An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution. 857-862 - P. R. Ancy, Addapalli V. N. Krishna, K. Balachandran, M. Balamurugan, O. S. GnanaPrakasi:

Survey on Attribute-based Encryption in Cloud Computing. 863-868 - Shoulin Yin, Jie Liu, Lin Teng:

A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence. 869-873 - Chencheng Hu, Dong Zheng, Rui Guo, Axin Wu, Liang Wang, Shiyao Gao:

A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks. 874-884 - Changsong Yang, Xiaoling Tao, Qiyu Chen:

New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage. 885-896

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














