International Journal of Network Security | ||
1. | Uniform Resource Locator Based Steganography Methodology
|
|
Abdelrahman Desoky, Vol. 20, No. 6, 2018, pp. 1005-1015 Article Full Text PDF |
||
2. | Application of Artificial Intelligence Technology in Computer Network Security
|
|
Jialiang Zhang, Vol. 20, No. 6, 2018, pp. 1016-1021 Article Full Text PDF |
||
3. | Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information
|
|
Govand Salih Kadir and Ihsan Alshahib Lami, Vol. 20, No. 6, 2018, pp. 1022-1032 Article Full Text PDF |
||
4. | Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery
|
|
Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li and Ze Fang, Vol. 20, No. 6, 2018, pp. 1033-1041 Article Full Text PDF |
||
5. | Application of Video Watermarking Using Subdivision Technique to Enhance Information Security
|
|
Mahesh Gangarde, Janardhan Chitode and Shruti Oza, Vol. 20, No. 6, 2018, pp. 1042-1052 Article Full Text PDF |
||
6. | Secure Stored Images Using Transparent Crypto Filter Driver
|
|
Osama Ahmed Khashan, Nour Mahmoud Khafajah, Vol. 20, No. 6, 2018, pp. 1053-1060 Article Full Text PDF |
||
7. | Android Malware Identification Through Visual Exploration of Disambly Files
|
|
Yongliang Zhao and Quan Qian, Vol. 20, No. 6, 2018, pp. 1061-1073 Article Full Text PDF |
||
8. | Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing
|
|
Hua Ma, Xiaoyu Han, Ting Peng and Linchao Zhang, Vol. 20, No. 6, 2018, pp. 1074-1084 Article Full Text PDF |
||
9. | Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network
|
|
V. Sangeetha and S. Swapna Kumar, Vol. 20, No. 6, 2018, pp. 1085-1092 Article Full Text PDF |
||
10. | A Review on DNA Based Cryptographic Techniques
|
|
Animesh Hazra, Soumya Ghosh, and Sampad Jash, Vol. 20, No. 6, 2018, pp. 1093-1104 Article Full Text PDF |
||
11. | A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map
|
|
Chunhu Li, Guangchun Luo, and Chunbao Li, Vol. 20, No. 6, 2018, pp. 1105-1114 Article Full Text PDF |
||
12. | ZBMRP: Zone Based MANET Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning
|
|
V. Preetha and K. Chitra, Vol. 20, No. 6, 2018, pp. 1115-1124 Article Full Text PDF |
||
13. | Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model
|
|
Lili Yao, Jiabing Liu, Dejun Wang, Jing Li and Bo Meng, Vol. 20, No. 6, 2018, pp. 1125-1136 Article Full Text PDF |
||
14. | Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy
|
|
Xiuxia Tian, Qian Song and Fuliang Tian, Vol. 20, No. 6, 2018, pp. 1137-1148 Article Full Text PDF |
||
15. | Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE
|
|
Kittur Philemon Kibiwott, Zhang Fengli, Omala A. Anyembe, Daniel Adu-Gyamfi, Vol. 20, No. 6, 2018, pp. 1149-1162 Article Full Text PDF |
||
16. | Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding
|
|
Eman Tarek, Osama Ouda, and Ahmed Atwan, Vol. 20, No. 6, 2018, pp. 1163-1174 Article Full Text PDF |
||
17. | An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines
|
|
Ledi Fang, Shundong Li, and Wenli Wang, Vol. 20, No. 6, 2018, pp. 1175-1182 Article Full Text PDF |
||
18. | A Provable Secure Identity-based Generalized Proxy Signcryption Scheme
|
|
Caixue Zhou, Yue Zhang, and Lingmin Wang, Vol. 20, No. 6, 2018, pp. 1183-1193 Article Full Text PDF |
||
19. | Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model
|
|
Wenjie Yang, Min-Rong Chen, and Guo-Qiang Zeng, Vol. 20, No. 6, 2018, pp. 1194-1199 Article Full Text PDF |
||
20. | A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping
|
|
Lin Teng and Hang Li, Vol. 20, No. 6, 2018, pp. 1200-1205 Article Full Text PDF |
||
21. | An Improved AES S-box Based on Fibonacci Numbers and Prime Factor
|
|
Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria and Mohd Nazran Mohammed Pauzi, Vol. 20, No. 6, 2018, pp. 1206-1214 Article Full Text PDF |
||
22. | Research on the Security Protection of E-Commerce Information under the Background of Mobile Consumption
|
|
Yun Zhang, Vol. 20, No. 6, 2018, pp. 1215-1220 Article Full Text PDF |
||
23. | A Conference Key Scheme Based on the Diffie-Hellman Key Exchange
|
|
Li-Chin Huang and Min-Shiang Hwang, Vol. 20, No. 6, 2018, pp. 1221-1226 Article Full Text PDF |
||
24. | Supervision and Investigation of Internet Fraud Crimes
|
|
Lei Zhang, Vol. 20, No. 6, 2018, pp. 1227-1233 Article Full Text PDF |
||
25. | Subject index to volume 20 (2018)
|
|
Article Full Text PDF | ||
26. | Author index to volume 20 (2018)
|
|
Article Full Text PDF | ||
27. | Reviewer index to volume 20 (2018)
|
|
Article Full Text PDF | ||
28. | All Papers to volume 20 (2018)
|
|
Article Full Text PDF | ||