International Journal of Network Security | ||
1. | 2-Adic Complexity of Sequences Generated by T-Functions
|
|
Yan Wang, Xueming Ren, Shunbo Li, Vol. 21, No. 1, 2019, pp. 1-6 Article Full Text PDF |
||
2. | Fully Secure Anonymous Identity Based Broadcast Encryption with Group of Prime Order
|
|
Yang Ming and Hongping Yuan, Vol. 21, No. 1, 2019, pp. 7-16 Article Full Text PDF |
||
3. | On The Secrecy Performance of Wireless Powered Device to Device Systems
|
|
Dinh-Thuan Do, Vol. 21, No. 1, 2019, pp. 17-21 Article Full Text PDF |
||
4. | An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map
|
|
Chunhu Li, Guangchun Luo, and Chunbao Li, Vol. 21, No. 1, 2019, pp. 22-29 Article Full Text PDF |
||
5. | Granger Causality in TCP Flooding Attack
|
|
Rup Kumar Deka, Dhruba Kumar Bhattacharyya, and Jugal Kumar Kalita, Vol. 21, No. 1, 2019, pp. 30-39 Article Full Text PDF |
||
6. | New Hierarchical Identity Based Encryption with maximum hierarchy
|
|
Dasari Kalyani and R. Sridevi, Vol. 21, No. 1, 2019, pp. 40-46 Article Full Text PDF |
||
7. | A Selective Self-adaptive Image Cryptosystem Based on Bit-planes Decomposition
|
|
Hossam Diab, Vol. 21, No. 1, 2019, pp. 47-61 Article Full Text PDF |
||
8. | Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering
|
|
Xiuxia Tian, Fuliang Tian, Anqin Zhang, and Xi Chen, Vol. 21, No. 1, 2019, pp. 62-70 Article Full Text PDF |
||
9. | Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin
|
|
Lijuan Guo, Xuelian Li, and Juntao Gao, Vol. 21, No. 1, 2019, pp. 71-82 Article Full Text PDF |
||
10. | Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding
|
|
Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye, Faith K. Deynu, Vol. 21, No. 1, 2019, pp. 83-90 Article Full Text PDF |
||
11. | An Efficient Fully Homomorphic Encryption Scheme
|
|
Ahmed El-Yahyaoui and Mohamed Dafir Ech-Cherif El Kettani, Vol. 21, No. 1, 2019, pp. 91-99 Article Full Text PDF |
||
12. | Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
|
|
Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, and Min-Shiang Hwang, Vol. 21, No. 1, 2019, pp. 100-104 Article Full Text PDF |
||
13. | Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion
|
|
Mengting Hu, Hang Gao, Tiegang Gao , Vol. 21, No. 1, 2019, pp. 105-114 Article Full Text PDF |
||
14. | Three Kinds of Network Security Situation Awareness Model Based on Big Data
|
|
Bowen Zhu, Yonghong Chen, Yiqiao Cai, Vol. 21, No. 1, 2019, pp. 115-121 Article Full Text PDF |
||
15. | NPKG: Novel Pairwise Key Generation for Resisting Key-based Threats in Wireless Sensor Network
|
|
M. Vaneeta and S. Swapna Kumar, Vol. 21, No. 1, 2019, pp. 122-129 Article Full Text PDF |
||
16. | Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing
|
|
Ye Lu and Tao Feng, Vol. 21, No. 1, 2019, pp. 130-136 Article Full Text PDF |
||
17. | Multimedia Social Network Authorization Scheme of Comparison-based Encryption
|
|
Cheng Li, Zhiyong Zhang, and Guoqin Chang, Vol. 21, No. 1, 2019, pp. 137-144 Article Full Text PDF |
||
18. | A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve
|
|
Subhas Chandra Sahana and Bubu Bhuyan, Vol. 21, No. 1, 2019, pp. 145-152 Article Full Text PDF |
||
19. | Identification and Processing of Network Abnormal Events Based on Network Intrusion Detection Algorithm
|
|
Yunbin He, Vol. 21, No. 1, 2019, pp. 153-159 Article Full Text PDF |
||
20. | Safety Protection of E-Commerce Logistics Information Data Under The Background Of Big Data
|
|
Yuan Zhao and Yanyan Zhang, Vol. 21, No. 1, 2019, pp. 160-165 Article Full Text PDF |
||
21. | A Context Establishment Framework for Cloud Computing Information Security Risk Management Based on the STOPE View
|
|
Bader Saeed Alghamdi, Mohamed Elnamaky, Mohammed Amer Arafah, Maazen Alsabaan, Saad Haj Bakry, Vol. 21, No. 1, 2019, pp. 166-176 Article Full Text PDF |
||