Quick Search:

Paper Preview:

International Journal of Network Security

1. ISCP: An Improved Blockchain Consensus Protocol
Zhong-Cheng Li, Jian-Hua Huang, Da-Qi Gao, Ya-Hui Jiang and Li Fan
Article Full Text PDF

2. OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification
Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, and Yang Wang
Article Full Text PDF

3. Additively LWE Based Homomorphic Encryption for Compact Devices with Enhanced Security
Ratnakumari Challa and Vijayakumari Gunta
Article Full Text PDF

4. An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m)
Shuang-Gen Liu, Rong-Rong Wang, Yun-Qi Li, and Can-Liang Zhai
Article Full Text PDF

5. A Fast Recovery Method for Single Disk Failure Based on EVENODD
Feng Xiao, Di Fan, and Dan Tang
Article Full Text PDF

6. A Pseudo Random Bit Generator Based on a Modified Chaotic Map
Chokri Nouar and Zine El Abidine Guennoun
Article Full Text PDF

7. Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy
Ashu Sharma and Sanjay Kumar Sahay
Article Full Text PDF

8. Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold
Daouda Ahmat, Marayi Choroma, Tégawendé F. Bissyandé
Article Full Text PDF

9. Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks
Gaimei Gao, Xinguang Peng, and Lizhong Jin
Article Full Text PDF

10. SPA Resistant Balanced Ternary Segmented Scalar Multiplication
Shuang-Gen Liu and Yuan-Yuan Ding
Article Full Text PDF

11. Network Security Situation Assessment Based on Text SimHash in Big Data Environment
Pengwen Lin and Yonghong Chen
Article Full Text PDF

12. Detection Algorithm for Sinkhole Attack in Body Area Sensor Networks Using Local Information
Adnan Nadeem and Turki Alghamdi
Article Full Text PDF

13. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
Shidong Zhang, Tongjiang Yan, Yuhua Sun, and Lianhai Wang
Article Full Text PDF

14. A Provably Secure Group Authentication Protocol for Various LTE Networks
Boriphat Kijjabuncha and Pipat Hiranvanichakorn
Article Full Text PDF

15. Probabilistic RSA with Homomorphism and Its Applications
Yaling Geng, Shundong Li, and Sufang Zhou
Article Full Text PDF

16. Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks
N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah
Article Full Text PDF

17. Implementation, Performance and Security Analysis for CryptoBin Algorithm
Ahmed H. Eltengy, Samaa M. Shohieb, Ali E. Takieldeen, and Mohamed S. Ksasy
Article Full Text PDF