Quick Search:

Volume: 21, No: 3 (May 1, 2019)

International Journal of Network Security

1. ISCP: An Improved Blockchain Consensus Protocol
Zhong-Cheng Li, Jian-Hua Huang, Da-Qi Gao, Ya-Hui Jiang and Li Fan, Vol. 21, No. 3, 2019, pp. 359-367
Article Full Text PDF

2. OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification
Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, and Yang Wang, Vol. 21, No. 3, 2019, pp. 368-377
Article Full Text PDF

3. Additively LWE Based Homomorphic Encryption for Compact Devices with Enhanced Security
Ratnakumari Challa and Vijayakumari Gunta, Vol. 21, No. 3, 2019, pp. 378-383
Article Full Text PDF

4. An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m)
Shuang-Gen Liu, Rong-Rong Wang, Yun-Qi Li, and Can-Liang Zhai, Vol. 21, No. 3, 2019, pp. 384-391
Article Full Text PDF

5. A Fast Recovery Method for Single Disk Failure Based on EVENODD
Feng Xiao, Di Fan, and Dan Tang, Vol. 21, No. 3, 2019, pp. 392-401
Article Full Text PDF

6. A Pseudo Random Bit Generator Based on a Modified Chaotic Map
Chokri Nouar and Zine El Abidine Guennoun, Vol. 21, No. 3, 2019, pp. 402-408
Article Full Text PDF

7. Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy
Ashu Sharma and Sanjay Kumar Sahay, Vol. 21, No. 3, 2019, pp. 409-417
Article Full Text PDF

8. Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold
Daouda Ahmat, Marayi Choroma, Tégawendé F. Bissyandé, Vol. 21, No. 3, 2019, pp. 418-427
Article Full Text PDF

9. Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks
Gaimei Gao, Xinguang Peng, and Lizhong Jin, Vol. 21, No. 3, 2019, pp. 428-437
Article Full Text PDF

10. A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier
Azidine Guezzaz, Ahmed Asimi, Younes Asimi, Zakariae Tbatous and Yassine Sadqi, Vol. 21, No. 3, 2019, pp. 438-450
Article Full Text PDF

11. Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage
Haichun Zhao, Xuanxia Yao, and Xuefeng Zheng, Vol. 21, No. 3, 2019, pp. 451-461
Article Full Text PDF

12. Authentication Techniques in the Internet of Things Environment: A Survey
Sunghyuck Hong, Vol. 21, No. 3, 2019, pp. 462-470
Article Full Text PDF

13. Virus Propagation Behavior Simulation Based on Node Movement Model of Wireless Multi-hop Network
Weimin Kang and Simiao Wang, Vol. 21, No. 3, 2019, pp. 471-476
Article Full Text PDF

14. A Cloud Computing Oriented Neural Network for Resource Demands and Management Scheduling
Gaoxiang Lou and Zongyan Cai, Vol. 21, No. 3, 2019, pp. 477-482
Article Full Text PDF

15. Trust in Ad Hoc Networks: A New Model Based on Clustering Algorithm
Ali Mansouri and Mohamed Salim Bouhlel, Vol. 21, No. 3, 2019, pp. 483-493
Article Full Text PDF

16. Two Number-guessing Problems Plus Applications in Cryptography
Xingbo Wang, Vol. 21, No. 3, 2019, pp. 494-500
Article Full Text PDF

17. General Model for Secure Electronic Cash Scheme
Dany Eka Saputra, Sarwono Sutikno, and Suhono Harso Supangkat, Vol. 21, No. 3, 2019, pp. 501-510
Article Full Text PDF

18. Secure Traffic Efficiency Control Protocol for Downtown Vehicular Networks
Maram Bani Younes, Vol. 21, No. 3, 2019, pp. 511-521
Article Full Text PDF

19. A New Erasure Code Decoding Algorithm
Di Fan, Feng Xiao, and Dan Tang, Vol. 21, No. 3, 2019, pp. 522-529
Article Full Text PDF

20. Computer Real-Time Location Forensics Method for Network Intrusion Crimes
Yingsu Qi, Vol. 21, No. 3, 2019, pp. 530-535
Article Full Text PDF

21. Subject index to volume 21 (2019)
Article Full Text PDF

22. Author index to volume 21 (2019)
Article Full Text PDF

23. Reviewer index to volume 21 (2019)
Article Full Text PDF

24. All Papers to volume 21 (2019)
Article Full Text PDF