Quick Search:

Paper Preview:

International Journal of Network Security

1. 2-Adic Complexity of Sequences Generated by T-Functions
Yan Wang, Xueming Ren, Shunbo Li
Article Full Text PDF

2. Fully Secure Anonymous Identity Based Broadcast Encryption with Group of Prime Order
Yang Ming and Hongping Yuan
Article Full Text PDF

3. On The Secrecy Performance of Wireless Powered Device to Device Systems
Dinh-Thuan Do
Article Full Text PDF

4. An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map
Chunhu Li, Guangchun Luo, and Chunbao Li
Article Full Text PDF

5. Granger Causality in TCP Flooding Attack
Rup Kumar Deka, Dhruba Kumar Bhattacharyya, and Jugal Kumar Kalita
Article Full Text PDF

6. New Hierarchical Identity Based Encryption with maximum hierarchy
Dasari Kalyani and R. Sridevi
Article Full Text PDF

7. A Selective Self-adaptive Image Cryptosystem Based on Bit-planes Decomposition
Hossam Diab
Article Full Text PDF

8. Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering
Xiuxia Tian, Fuliang Tian, Anqin Zhang, and Xi Chen
Article Full Text PDF

9. Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin
Lijuan Guo, Xuelian Li, and Juntao Gao
Article Full Text PDF

10. Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding
Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye, Faith K. Deynu
Article Full Text PDF

11. An Efficient Fully Homomorphic Encryption Scheme
Ahmed El-Yahyaoui and Mohamed Dafir Ech-Cherif El Kettani
Article Full Text PDF

12. Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion
Mengting Hu, Hang Gao, Tiegang Gao
Article Full Text PDF

13. Three Kinds of Network Security Situation Awareness Model Based on Big Data
Bowen Zhu, Yonghong Chen, Yiqiao Cai
Article Full Text PDF

14. NPKG: Novel Pairwise Key Generation for Resisting Key-based Threats in Wireless Sensor Network
M. Vaneeta and S. Swapna Kumar
Article Full Text PDF

15. Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing
Ye Lu and Tao Feng
Article Full Text PDF

16. Multimedia Social Network Authorization Scheme of Comparison-based Encryption
Cheng Li, Zhiyong Zhang, and Guoqin Chang
Article Full Text PDF

17. A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve
Subhas Chandra Sahana and Bubu Bhuyan
Article Full Text PDF

18. Identification and Processing of Network Abnormal Events Based on Network Intrusion Detection Algorithm
Yunbin He
Article Full Text PDF

19. Safety Protection of E-Commerce Logistics Information Data Under The Background Of Big Data
Yuan Zhao and Yanyan Zhang
Article Full Text PDF