International Journal of Network Security | ||
1. | ISCP: An Improved Blockchain Consensus Protocol
|
|
Zhong-Cheng Li, Jian-Hua Huang, Da-Qi Gao, Ya-Hui Jiang and Li Fan, Vol. 21, No. 3, 2019, pp. 359-367 Article Full Text PDF |
||
2. | OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification
|
|
Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, and Yang Wang, Vol. 21, No. 3, 2019, pp. 368-377 Article Full Text PDF |
||
3. | Additively LWE Based Homomorphic Encryption for Compact Devices with Enhanced Security
|
|
Ratnakumari Challa and Vijayakumari Gunta, Vol. 21, No. 3, 2019, pp. 378-383 Article Full Text PDF |
||
4. | An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m)
|
|
Shuang-Gen Liu, Rong-Rong Wang, Yun-Qi Li, and Can-Liang Zhai, Vol. 21, No. 3, 2019, pp. 384-391 Article Full Text PDF |
||
5. | A Fast Recovery Method for Single Disk Failure Based on EVENODD
|
|
Feng Xiao, Di Fan, and Dan Tang, Vol. 21, No. 3, 2019, pp. 392-401 Article Full Text PDF |
||
6. | A Pseudo Random Bit Generator Based on a Modified Chaotic Map
|
|
Chokri Nouar and Zine El Abidine Guennoun, Vol. 21, No. 3, 2019, pp. 402-408 Article Full Text PDF |
||
7. | Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy
|
|
Ashu Sharma and Sanjay Kumar Sahay, Vol. 21, No. 3, 2019, pp. 409-417 Article Full Text PDF |
||
8. | Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold
|
|
Daouda Ahmat, Marayi Choroma, Tégawendé F. Bissyandé, Vol. 21, No. 3, 2019, pp. 418-427 Article Full Text PDF |
||
9. | Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks
|
|
Gaimei Gao, Xinguang Peng, and Lizhong Jin, Vol. 21, No. 3, 2019, pp. 428-437 Article Full Text PDF |
||
10. | A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier
|
|
Azidine Guezzaz, Ahmed Asimi, Younes Asimi, Zakariae Tbatous and Yassine Sadqi, Vol. 21, No. 3, 2019, pp. 438-450 Article Full Text PDF |
||
11. | Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage
|
|
Haichun Zhao, Xuanxia Yao, and Xuefeng Zheng, Vol. 21, No. 3, 2019, pp. 451-461 Article Full Text PDF |
||
12. | Authentication Techniques in the Internet of Things Environment: A Survey
|
|
Sunghyuck Hong, Vol. 21, No. 3, 2019, pp. 462-470 Article Full Text PDF |
||
13. | Virus Propagation Behavior Simulation Based on Node Movement Model of Wireless Multi-hop Network
|
|
Weimin Kang and Simiao Wang, Vol. 21, No. 3, 2019, pp. 471-476 Article Full Text PDF |
||
14. | A Cloud Computing Oriented Neural Network for Resource Demands and Management Scheduling
|
|
Gaoxiang Lou and Zongyan Cai, Vol. 21, No. 3, 2019, pp. 477-482 Article Full Text PDF |
||
15. | Trust in Ad Hoc Networks: A New Model Based on Clustering Algorithm
|
|
Ali Mansouri and Mohamed Salim Bouhlel, Vol. 21, No. 3, 2019, pp. 483-493 Article Full Text PDF |
||
16. | Two Number-guessing Problems Plus Applications in Cryptography
|
|
Xingbo Wang, Vol. 21, No. 3, 2019, pp. 494-500 Article Full Text PDF |
||
17. | General Model for Secure Electronic Cash Scheme
|
|
Dany Eka Saputra, Sarwono Sutikno, and Suhono Harso Supangkat, Vol. 21, No. 3, 2019, pp. 501-510 Article Full Text PDF |
||
18. | Secure Traffic Efficiency Control Protocol for Downtown Vehicular Networks
|
|
Maram Bani Younes, Vol. 21, No. 3, 2019, pp. 511-521 Article Full Text PDF |
||
19. | A New Erasure Code Decoding Algorithm
|
|
Di Fan, Feng Xiao, and Dan Tang, Vol. 21, No. 3, 2019, pp. 522-529 Article Full Text PDF |
||
20. | Computer Real-Time Location Forensics Method for Network Intrusion Crimes
|
|
Yingsu Qi, Vol. 21, No. 3, 2019, pp. 530-535 Article Full Text PDF |
||
21. | Subject index to volume 21 (2019)
|
|
Article Full Text PDF | ||
22. | Author index to volume 21 (2019)
|
|
Article Full Text PDF | ||
23. | Reviewer index to volume 21 (2019)
|
|
Article Full Text PDF | ||
24. | All Papers to volume 21 (2019)
|
|
Article Full Text PDF | ||