Quick Search:

Paper Preview:

International Journal of Network Security

1. A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
Xueqin Zhang, Baoping Wang, and Wenpeng Zhang
Article Full Text PDF

2. A Secure Privacy-Preserving Cloud Auditing Scheme with Data Deduplication
Chen Li and Zhenhua Liu
Article Full Text PDF

3. A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing
Yanjun Liu and Chin-Chen Chang
Article Full Text PDF

4. Privacy Preserving and Public Auditable Integrity Checking on Dynamic Cloud Data
Surmila Thokchom and Dilip Kr. Saikia
Article Full Text PDF

5. On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism
Wien Hong, Shuozhen Zheng, and Xiaoyu Zhou
Article Full Text PDF

6. Secure Multiple-Antenna Ultrawideband System: A Wireless Physical-Layer Security Perspective
Tanit Somleewong and Kiattisak Maichalernnukul
Article Full Text PDF

7. A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network
Huaijin Liu, Yonghong Chen, Hui Tian, and Tian Wang
Article Full Text PDF

8. Construction and Analysis of Key Generation Algorithms Based on Modified Fibonacci and Scrambling Factors for Privacy Preservation
Amiruddin Amiruddin, Anak Agung Putri Ratna, and Riri Fitri Sari
Article Full Text PDF

9. Spectrogram-based Efficient Perceptual Hashing Scheme for Speech Identification
Qiu-Yu Zhang, Tao Zhang, Si-Bin Qiao, and Dong-Fang Wu
Article Full Text PDF

10. A Note on the Construction of Lightweight Cyclic MDS Matrices
Akbar Mahmoodi Rishakani, Yousef Fekri Dabanloo, Seyed Mojtaba Dehnavi, Mohammad Reza Mirzaee Shamsabad, Nasour Bagheri
Article Full Text PDF

11. Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme
Zhenhua Liu and Yaqing Fan
Article Full Text PDF

12. Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model
Marwa R. Mohamed, Abdurrahman A. Nasr, I. F. Tarrad and Salah R. Abdulmageed
Article Full Text PDF

13. Tight Proofs of Identity-based Signatures without Random Oracle
Huiyan Chen, Yanshuo Zhang, Zongjie Wan, Chenchen Zhang
Article Full Text PDF

14. Comments on Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting
Qingfeng Cheng and Xinglong Zhang
Article Full Text PDF

15. SPA Resistant Balanced Ternary Segmented Scalar Multiplication
Shuang-Gen Liu and Yuan-Yuan Ding
Article Full Text PDF

16. ISCP: An Improved Blockchain Consensus Protocol
Zhong-Cheng Li, Jian-Hua Huang, Da-Qi Gao, Ya-Hui Jiang and Li Fan
Article Full Text PDF

17. Network Security Situation Assessment Based on Text SimHash in Big Data Environment
Pengwen Lin and Yonghong Chen
Article Full Text PDF

18. OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification
Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, and Yang Wang
Article Full Text PDF