| International Journal of Network Security | ||
| 1. | ISCP: An Improved Blockchain Consensus Protocol
|
|
| Zhong-Cheng Li, Jian-Hua Huang, Da-Qi Gao, Ya-Hui Jiang and Li Fan, Vol. 21, No. 3, 2019, pp. 359-367 Article Full Text PDF |
||
| 2. | OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification
|
|
| Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, and Yang Wang, Vol. 21, No. 3, 2019, pp. 368-377 Article Full Text PDF |
||
| 3. | Additively LWE Based Homomorphic Encryption for Compact Devices with Enhanced Security
|
|
| Ratnakumari Challa and Vijayakumari Gunta, Vol. 21, No. 3, 2019, pp. 378-383 Article Full Text PDF |
||
| 4. | An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m)
|
|
| Shuang-Gen Liu, Rong-Rong Wang, Yun-Qi Li, and Can-Liang Zhai, Vol. 21, No. 3, 2019, pp. 384-391 Article Full Text PDF |
||
| 5. | A Fast Recovery Method for Single Disk Failure Based on EVENODD
|
|
| Feng Xiao, Di Fan, and Dan Tang, Vol. 21, No. 3, 2019, pp. 392-401 Article Full Text PDF |
||
| 6. | A Pseudo Random Bit Generator Based on a Modified Chaotic Map
|
|
| Chokri Nouar and Zine El Abidine Guennoun, Vol. 21, No. 3, 2019, pp. 402-408 Article Full Text PDF |
||
| 7. | Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy
|
|
| Ashu Sharma and Sanjay Kumar Sahay, Vol. 21, No. 3, 2019, pp. 409-417 Article Full Text PDF |
||
| 8. | Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold
|
|
| Daouda Ahmat, Marayi Choroma, Tégawendé F. Bissyandé, Vol. 21, No. 3, 2019, pp. 418-427 Article Full Text PDF |
||
| 9. | Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks
|
|
| Gaimei Gao, Xinguang Peng, and Lizhong Jin, Vol. 21, No. 3, 2019, pp. 428-437 Article Full Text PDF |
||
| 10. | A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier
|
|
| Azidine Guezzaz, Ahmed Asimi, Younes Asimi, Zakariae Tbatous and Yassine Sadqi, Vol. 21, No. 3, 2019, pp. 438-450 Article Full Text PDF |
||
| 11. | Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage
|
|
| Haichun Zhao, Xuanxia Yao, and Xuefeng Zheng, Vol. 21, No. 3, 2019, pp. 451-461 Article Full Text PDF |
||
| 12. | Authentication Techniques in the Internet of Things Environment: A Survey
|
|
| Sunghyuck Hong, Vol. 21, No. 3, 2019, pp. 462-470 Article Full Text PDF |
||
| 13. | Virus Propagation Behavior Simulation Based on Node Movement Model of Wireless Multi-hop Network
|
|
| Weimin Kang and Simiao Wang, Vol. 21, No. 3, 2019, pp. 471-476 Article Full Text PDF |
||
| 14. | A Cloud Computing Oriented Neural Network for Resource Demands and Management Scheduling
|
|
| Gaoxiang Lou and Zongyan Cai, Vol. 21, No. 3, 2019, pp. 477-482 Article Full Text PDF |
||
| 15. | Trust in Ad Hoc Networks: A New Model Based on Clustering Algorithm
|
|
| Ali Mansouri and Mohamed Salim Bouhlel, Vol. 21, No. 3, 2019, pp. 483-493 Article Full Text PDF |
||
| 16. | Two Number-guessing Problems Plus Applications in Cryptography
|
|
| Xingbo Wang, Vol. 21, No. 3, 2019, pp. 494-500 Article Full Text PDF |
||
| 17. | General Model for Secure Electronic Cash Scheme
|
|
| Dany Eka Saputra, Sarwono Sutikno, and Suhono Harso Supangkat, Vol. 21, No. 3, 2019, pp. 501-510 Article Full Text PDF |
||
| 18. | Secure Traffic Efficiency Control Protocol for Downtown Vehicular Networks
|
|
| Maram Bani Younes, Vol. 21, No. 3, 2019, pp. 511-521 Article Full Text PDF |
||
| 19. | A New Erasure Code Decoding Algorithm
|
|
| Di Fan, Feng Xiao, and Dan Tang, Vol. 21, No. 3, 2019, pp. 522-529 Article Full Text PDF |
||
| 20. | Computer Real-Time Location Forensics Method for Network Intrusion Crimes
|
|
| Yingsu Qi, Vol. 21, No. 3, 2019, pp. 530-535 Article Full Text PDF |
||
| 21. | Subject index to volume 21 (2019)
|
|
| Article Full Text PDF | ||
| 22. | Author index to volume 21 (2019)
|
|
| Article Full Text PDF | ||
| 23. | Reviewer index to volume 21 (2019)
|
|
| Article Full Text PDF | ||
| 24. | All Papers to volume 21 (2019)
|
|
| Article Full Text PDF | ||