Quick Search:

Volume: 21, No: 1 (January 1, 2019)

International Journal of Network Security

1. 2-Adic Complexity of Sequences Generated by T-Functions
Yan Wang, Xueming Ren, Shunbo Li, Vol. 21, No. 1, 2019, pp. 1-6
Article Full Text PDF

2. Fully Secure Anonymous Identity Based Broadcast Encryption with Group of Prime Order
Yang Ming and Hongping Yuan, Vol. 21, No. 1, 2019, pp. 7-16
Article Full Text PDF

3. On The Secrecy Performance of Wireless Powered Device to Device Systems
Dinh-Thuan Do, Vol. 21, No. 1, 2019, pp. 17-21
Article Full Text PDF

4. An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map
Chunhu Li, Guangchun Luo, and Chunbao Li, Vol. 21, No. 1, 2019, pp. 22-29
Article Full Text PDF

5. Granger Causality in TCP Flooding Attack
Rup Kumar Deka, Dhruba Kumar Bhattacharyya, and Jugal Kumar Kalita, Vol. 21, No. 1, 2019, pp. 30-39
Article Full Text PDF

6. New Hierarchical Identity Based Encryption with maximum hierarchy
Dasari Kalyani and R. Sridevi, Vol. 21, No. 1, 2019, pp. 40-46
Article Full Text PDF

7. A Selective Self-adaptive Image Cryptosystem Based on Bit-planes Decomposition
Hossam Diab, Vol. 21, No. 1, 2019, pp. 47-61
Article Full Text PDF

8. Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering
Xiuxia Tian, Fuliang Tian, Anqin Zhang, and Xi Chen, Vol. 21, No. 1, 2019, pp. 62-70
Article Full Text PDF

9. Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin
Lijuan Guo, Xuelian Li, and Juntao Gao, Vol. 21, No. 1, 2019, pp. 71-82
Article Full Text PDF

10. Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding
Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye, Faith K. Deynu, Vol. 21, No. 1, 2019, pp. 83-90
Article Full Text PDF

11. An Efficient Fully Homomorphic Encryption Scheme
Ahmed El-Yahyaoui and Mohamed Dafir Ech-Cherif El Kettani, Vol. 21, No. 1, 2019, pp. 91-99
Article Full Text PDF

12. Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, and Min-Shiang Hwang, Vol. 21, No. 1, 2019, pp. 100-104
Article Full Text PDF

13. Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion
Mengting Hu, Hang Gao, Tiegang Gao , Vol. 21, No. 1, 2019, pp. 105-114
Article Full Text PDF

14. Three Kinds of Network Security Situation Awareness Model Based on Big Data
Bowen Zhu, Yonghong Chen, Yiqiao Cai, Vol. 21, No. 1, 2019, pp. 115-121
Article Full Text PDF

15. NPKG: Novel Pairwise Key Generation for Resisting Key-based Threats in Wireless Sensor Network
M. Vaneeta and S. Swapna Kumar, Vol. 21, No. 1, 2019, pp. 122-129
Article Full Text PDF

16. Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing
Ye Lu and Tao Feng, Vol. 21, No. 1, 2019, pp. 130-136
Article Full Text PDF

17. Multimedia Social Network Authorization Scheme of Comparison-based Encryption
Cheng Li, Zhiyong Zhang, and Guoqin Chang, Vol. 21, No. 1, 2019, pp. 137-144
Article Full Text PDF

18. A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve
Subhas Chandra Sahana and Bubu Bhuyan, Vol. 21, No. 1, 2019, pp. 145-152
Article Full Text PDF

19. Identification and Processing of Network Abnormal Events Based on Network Intrusion Detection Algorithm
Yunbin He, Vol. 21, No. 1, 2019, pp. 153-159
Article Full Text PDF

20. Safety Protection of E-Commerce Logistics Information Data Under The Background Of Big Data
Yuan Zhao and Yanyan Zhang, Vol. 21, No. 1, 2019, pp. 160-165
Article Full Text PDF

21. A Context Establishment Framework for Cloud Computing Information Security Risk Management Based on the STOPE View
Bader Saeed Alghamdi, Mohamed Elnamaky, Mohammed Amer Arafah, Maazen Alsabaan, Saad Haj Bakry, Vol. 21, No. 1, 2019, pp. 166-176
Article Full Text PDF