Quick Search:

Volume: 20, No: 6 (November 1, 2018)

International Journal of Network Security

1. Uniform Resource Locator Based Steganography Methodology
Abdelrahman Desoky, Vol. 20, No. 6, 2018, pp. 1005-1015
Article Full Text PDF

2. Application of Artificial Intelligence Technology in Computer Network Security
Jialiang Zhang, Vol. 20, No. 6, 2018, pp. 1016-1021
Article Full Text PDF

3. Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information
Govand Salih Kadir and Ihsan Alshahib Lami, Vol. 20, No. 6, 2018, pp. 1022-1032
Article Full Text PDF

4. Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery
Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li and Ze Fang, Vol. 20, No. 6, 2018, pp. 1033-1041
Article Full Text PDF

5. Application of Video Watermarking Using Subdivision Technique to Enhance Information Security
Mahesh Gangarde, Janardhan Chitode and Shruti Oza, Vol. 20, No. 6, 2018, pp. 1042-1052
Article Full Text PDF

6. Secure Stored Images Using Transparent Crypto Filter Driver
Osama Ahmed Khashan, Nour Mahmoud Khafajah, Vol. 20, No. 6, 2018, pp. 1053-1060
Article Full Text PDF

7. Android Malware Identification Through Visual Exploration of Disambly Files
Yongliang Zhao and Quan Qian, Vol. 20, No. 6, 2018, pp. 1061-1073
Article Full Text PDF

8. Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing
Hua Ma, Xiaoyu Han, Ting Peng and Linchao Zhang, Vol. 20, No. 6, 2018, pp. 1074-1084
Article Full Text PDF

9. Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network
V. Sangeetha and S. Swapna Kumar, Vol. 20, No. 6, 2018, pp. 1085-1092
Article Full Text PDF

10. A Review on DNA Based Cryptographic Techniques
Animesh Hazra, Soumya Ghosh, and Sampad Jash, Vol. 20, No. 6, 2018, pp. 1093-1104
Article Full Text PDF

11. A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map
Chunhu Li, Guangchun Luo, and Chunbao Li, Vol. 20, No. 6, 2018, pp. 1105-1114
Article Full Text PDF

12. ZBMRP: Zone Based MANET Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning
V. Preetha and K. Chitra, Vol. 20, No. 6, 2018, pp. 1115-1124
Article Full Text PDF

13. Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model
Lili Yao, Jiabing Liu, Dejun Wang, Jing Li and Bo Meng, Vol. 20, No. 6, 2018, pp. 1125-1136
Article Full Text PDF

14. Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy
Xiuxia Tian, Qian Song and Fuliang Tian, Vol. 20, No. 6, 2018, pp. 1137-1148
Article Full Text PDF

15. Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE
Kittur Philemon Kibiwott, Zhang Fengli, Omala A. Anyembe, Daniel Adu-Gyamfi, Vol. 20, No. 6, 2018, pp. 1149-1162
Article Full Text PDF

16. Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding
Eman Tarek, Osama Ouda, and Ahmed Atwan, Vol. 20, No. 6, 2018, pp. 1163-1174
Article Full Text PDF

17. An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines
Ledi Fang, Shundong Li, and Wenli Wang, Vol. 20, No. 6, 2018, pp. 1175-1182
Article Full Text PDF

18. A Provable Secure Identity-based Generalized Proxy Signcryption Scheme
Caixue Zhou, Yue Zhang, and Lingmin Wang, Vol. 20, No. 6, 2018, pp. 1183-1193
Article Full Text PDF

19. Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model
Wenjie Yang, Min-Rong Chen, and Guo-Qiang Zeng, Vol. 20, No. 6, 2018, pp. 1194-1199
Article Full Text PDF

20. A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping
Lin Teng and Hang Li, Vol. 20, No. 6, 2018, pp. 1200-1205
Article Full Text PDF

21. An Improved AES S-box Based on Fibonacci Numbers and Prime Factor
Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria and Mohd Nazran Mohammed Pauzi, Vol. 20, No. 6, 2018, pp. 1206-1214
Article Full Text PDF

22. Research on the Security Protection of E-Commerce Information under the Background of Mobile Consumption
Yun Zhang, Vol. 20, No. 6, 2018, pp. 1215-1220
Article Full Text PDF

23. A Conference Key Scheme Based on the Diffie-Hellman Key Exchange
Li-Chin Huang and Min-Shiang Hwang, Vol. 20, No. 6, 2018, pp. 1221-1226
Article Full Text PDF

24. Supervision and Investigation of Internet Fraud Crimes
Lei Zhang, Vol. 20, No. 6, 2018, pp. 1227-1233
Article Full Text PDF

25. Subject index to volume 20 (2018)
Article Full Text PDF

26. Author index to volume 20 (2018)
Article Full Text PDF

27. Reviewer index to volume 20 (2018)
Article Full Text PDF

28. All Papers to volume 20 (2018)
Article Full Text PDF