default search action
International Journal of Network Security, Volume 22
Volume 22, Number 1, January 2020
- Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, Xiangmin Guo:
Packet Watermarking With ECG Biological Feature. 1-11 - Jia-Qi Wang, Yun-Feng Zhang, Daowei Liu:
Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce. 12-23 - Hua Ma, Guohua Tian, Linchao Zhang:
Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing. 24-35 - Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen:
A Note On One Secure Data Self-Destructing Scheme In Cloud Computing. 36-40 - Shahrzad Sedaghat:
The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks. 41-53 - Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, Yan Xiong:
A Formal Framework of Shielding Systems by Stepwise Refinement. 54-67 - Hui Tian, Zhao-Hua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, Yiqiao Cai:
StegoNote: Steganography in Guitar Music Using Note Modulation. 68-79 - Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, Bo Meng:
Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model. 80-92 - Budi Gunawan, Barito Mulyo Ratmono:
Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace. 93-101 - Hui Guo, Lunzhi Deng:
Certificateless Ring Signcryption Scheme from Pairings. 102-111 - Lin Teng, Hang Li, Shoulin Yin, Yang Sun:
A Modified Advanced Encryption Standard for Data Security. 112-117 - Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon:
Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey. 118-125 - Xiaofeng Chen, Wenlong Guo:
Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images. 126-135 - Ying-Chih Tseng, Heng Ma:
A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information. 136-144 - Jing Chen, Feng Zhao, Haiyan Xing:
Research on Security of Mobile Communication Information Transmission Based on Heterogeneous Network. 145-149 - Shidong Zhang, Tongjiang Yan, Yuhua Sun, Lianhai Wang:
Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation. 150-154 - Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, Yang Sun:
An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain. 155-160 - Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu:
Attribute Based Encryption with Efficient Revocation from Lattices. 161-170 - Zepeng Zhuo, Jinfeng Chong, Lei Yu:
Correlation Functions of m-Sequences of Different Lengths. 171-176 - Xiaoyi Hong:
Network Security Situation Prediction Based on Grey Relational Analysis and Support Vector Machine Algorithm. 177-182
Volume 22, Number 2, March 2020
- You-Jian Yu, Guang-Fu Wang, Jie Zhao:
FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks. 183-190 - Keke Wu, Bo Peng, Hua Xie, Shaobin Zhan:
A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks. 191-200 - Hui Xia, Weiji Yang:
Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone. 201-211 - Wei-Liang Tai, Ya-Fen Chang, Wen-Hsin Huang:
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing. 212-217 - Rui-Hong Dong, Hou-Hua Yan, Qiu-Yu Zhang:
An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm. 218-230 - Emmanuel Mugabo, Qiu-Yu Zhang:
Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing. 231-241 - Yang Chen, Yonghong Chen:
A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis. 242-249 - Javad Saadatmandan, Amirhossein Rahimi:
A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat. 250-256 - Seth Alornyo, Yanan Zhao, Guobin Zhu, Hu Xiong:
Identity Based Key-Insulated Encryption with Outsourced Equality Test. 257-264 - Huijun Yao, Chaopeng Li, Peng Sun:
Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detection. 265-274 - Pengshou Xie, Xue-Ming Han, Tao Feng, Yan Yan, Guoqiang Ma:
A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles. 275-282 - Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, Elsayed M. Badr:
Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory. 283-295 - Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:
Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell. 296-305 - Yueyang Su, Jing Wan, Junkai Yi:
A PSO-based Wavelet-core ELM for Abnormal Flow Detection. 306-313 - Chu Zhao, Shoulin Yin, Hang Li, Yang Sun:
Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group. 314-320 - Ming Sang Chang, Chih Ping Yen:
LinkedIn Social Media Forensics on Windows 10. 321-330 - Zhengjun Cao, Zhen Chen, Ruizhong Wei, Lihua Liu:
Run-based Modular Reduction Method. 331-336 - Yuanquan Shi, Hong Shen:
Anomaly Detection for Network Flow Using Immune Network and Density Peak. 337-346 - Pengshou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guoqiang Ma, Xue-Ming Han:
Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk. 347-357 - Hsieh-Tsen Pan, Hung-Wei Yang, Min-Shiang Hwang:
An Enhanced Secure Smart Card-based Password Authentication Scheme. 358-363
Volume 22, Number 3, March 2020
- Jingyu Wang, Jingnan Dong, Yuesheng Tan:
Role Mining Algorithms Satisfied the Permission Cardinality Constraint. 371-380 - Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications. 381-391 - Jianhong Zhang, Wenle Bai, Zhengtao Jiang:
On the Security of a Practical Constant-Size Ring Signature Scheme. 392-396 - Syed Mohd Faisal, Taskeen Zaidi:
Timestamp Based Detection of Sybil Attack in VANET. 397-408 - Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:
Static Analysis of Superfluous Network Transmissions in Android Applications. 409-418 - Shoulin Yin, Jie Liu, Lin Teng:
Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption. 419-424 - Xu Zhao, Guangqiu Huang, Reza Mousoli:
A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm. 425-434 - Faisal Nabi, Jianming Yong, Xiaohui Tao:
A Novel Approach for Component based Application Logic Event Attack Modeling. 435-441 - Yang Liu, Mingxing He, Fangyuan Pu:
Anonymous Transaction of Digital Currency Based on Blockchain. 442-448 - Zheng-Zhi Tang, Xuewen Zeng, Zhichuan Guo, Mangu Song:
Malware Traffic Classification Based on Recurrence Quantification Analysis. 449-459 - Qianlong Dang, Hua Ma, Zhenhua Liu, Ying Xie:
Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage. 460-473 - Cungang Yang, Celia Li:
Design of Key Management Protocols for Internet of Things. 474-483 - Jing Bi, Shoulin Yin, Hang Li, Lin Teng, Chu Zhao:
Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems. 484-489 - Tao Wan, Xiaochang Liu, Weichuan Liao, Nan Jiang:
Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture. 490-501 - Ke Gu, Dianxing Liu, Bo Yin:
Efficient Group Signature Scheme without Pairings. 502-513 - Tanweer Alam:
Internet of Things: A Secure Cloud-based MANET Mobility Model. 514-520 - Hefeng Chen, Chin-Chen Chang, Kaimeng Chen:
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem. 521-531 - Yuanyuan Xiao, Xiaoyao Xie:
Application of Novel Gabor-DCNN into RGB-D Face Recognition. 532-539 - Munawar Hussain, Jiadong Ren, Awais Akram:
Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network. 540-547
Volume 22, Number 4, July 2020
- Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu:
Sharing a Secret Image in the Cloud Using Two Shadows. 551-560 - Hui Guo, Lunzhi Deng:
An Identity Based Proxy Signcryption Scheme without Pairings. 561-568 - Shuang-Gen Liu, Shi-Mei Lu, Rui-Wen Gong:
Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m). 569-574 - Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, Yanjun Liu:
A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding. 575-583 - Cai-xue Zhou:
Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System. 584-588 - Zhi-Ge He:
Multi-Parameter and Time Series Based Trust for IoT Smart Sensors. 589-596 - Qingfeng Cheng, Yuting Li, Qi Jiang, Xiong Li:
Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols. 597-601 - Alain Bertrand Bomgni, Garrik Brel Jagho Mdemaya:
An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks. 602-609 - Xiaolin Chen, Zhixiong Chen, Huaning Liu:
A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}. 610-620 - Tianhong Yang:
Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography. 621-626 - Changguang Wang, Zimeng Dai, Dongmei Zhao, Fangwei Wang:
A Novel Identity-based Authentication Scheme for IoV Security. 627-637 - Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, Pabel Miah:
A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms. 638-644 - Fuxiao Zhou, Yanping Li, Changlu Lin:
A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security. 645-654 - Pengshou Xie, Guoqiang Ma, Tao Feng, Yan Yan, Xue-Ming Han:
Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles. 655-663 - Yongshuang Wei, Jianhua Chen:
Tripartite Authentication Protocol RFID/NFC Based on ECC. 664-671 - Cungang Yang, Celia Li:
Secure Sharing of Data for Dynamic Group in Public Cloud. 672-680 - Zhengjun Cao, Xiqi Wang, Lihua Liu:
A Note on One Popular Non-Interactive Zero-Knowledge Proof System. 681-685 - Linfan Wang, Yonghong Chen:
A Perceptual Hash-based Approach to Detect Covert Timing Channels. 686-697 - Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, Dong Zheng:
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices. 698-707 - Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang:
Research on the Secure Financial Surveillance Blockchain Systems. 708-716
Volume 22, Number 5, September 2020
- Li-Chin Huang, Chun-Hsien Chang, Min-Shiang Hwang:
Research on Malware Detection and Classification Based on Artificial Intelligence. 717-727 - Fei Tang, Dong Huang:
A BLS Signature Scheme from Multilinear Maps. 728-735 - Changsong Jiang, Yuhua Sun, Xueting Liang:
Eighth Power Residue Double Circulant Self-Dual Codes. 736-742 - Seth Alornyo, Acheampong Edward Mensah, Abraham Opanfo Abbam:
Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing. 743-751 - Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:
One-Code-Pass User Authentication Based on QR Code and Secret Sharing. 752-762 - Xiaoxu Gao, Leyou Zhang:
Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience. 763-774 - Lin Mei, Fengli Zhang:
A Distributed Density-based Outlier Detection Algorithm on Big Data. 775-781 - Jinyue Bian, Quan Qian:
Binary Executable Files Homology Detection with Genetic Algorithm. 782-792 - L. Mancy, S. Maria Celestin Vigila:
A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications. 793-800 - Shanshan Zhang:
A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation. 801-808 - Haiou Yang, Youliang Tian:
Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique. 809-814 - Li Kang, Leyou Zhang:
A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme. 815-827 - Ming Sang Chang, Chih Ping Yen:
Evidence Gathering of Facebook Messenger on Android. 828-837 - Jian Liu, Feilong Qin:
Protection of User Data by Differential Privacy Algorithms. 838-844 - Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System. 845-856 - Bin Wang:
An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution. 857-862 - P. R. Ancy, Addapalli V. N. Krishna, K. Balachandran, M. Balamurugan, O. S. GnanaPrakasi:
Survey on Attribute-based Encryption in Cloud Computing. 863-868 - Shoulin Yin, Jie Liu, Lin Teng:
A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence. 869-873 - Chencheng Hu, Dong Zheng, Rui Guo, Axin Wu, Liang Wang, Shiyao Gao:
A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks. 874-884 - Changsong Yang, Xiaoling Tao, Qiyu Chen:
New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage. 885-896
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.