Quick Search:

Volume: 21, No: 4 (July 1, 2019)

International Journal of Network Security

1. AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS
Ying-Chin Chen, Kuo-Jui Wei, Jung-San Lee, Ngoc-Tu Huynh, and Jyun-Hong Lin, Vol. 21, No. 4, 2019, pp. 537-544
Article Full Text PDF

2. E-commerce Trade Consumption Payment Security and Privacy Based on Improved B2C Model
Linzhu Hu, Vol. 21, No. 4, 2019, pp. 545-550
Article Full Text PDF

3. Efficient Hierarchical Key Management Scheme for VR/AR Database Systems
Tsung-Chih Hsiao, Yu-Min Huang, Yu-Fang Chung, Tzer-Long Chen, and Tzer-Shyong Chen, Vol. 21, No. 4, 2019, pp. 551-555
Article Full Text PDF

4. An Algorithm of the Privacy Security Protection Based on Location Service in the Internet of Vehicles
Peng-Shou Xie, Tian-Xia Fu, and Hong-Jin Fan, Vol. 21, No. 4, 2019, pp. 556-565
Article Full Text PDF

5. Managing Computer Security, Risk Analysis and Threat Using ISO 31000:2009: Case Study at Seiyun Community College, Yemen
Abdullah A. Al-khatib and Mohammed A. Hassan, Vol. 21, No. 4, 2019, pp. 566-575
Article Full Text PDF

6. On the Security of a Certi ficateless Proxy Signature Scheme in the Standard Model
Caixue Zhou, Xiwei Dong, Lihua Wang, and Tao Li, Vol. 21, No. 4, 2019, pp. 576-581
Article Full Text PDF

7. A Dynamic ID Based Authenticated Group Key Agreement Protocol from Pairing
Shruti Nathani, B. P. Tripathi, Shaheena Khatoon, Vol. 21, No. 4, 2019, pp. 582-591
Article Full Text PDF

8. Unidirectional FHPRE Scheme from Lattice for Cloud Computing
Juyan Li, Chunguang Ma, Lei Zhang, and Qi Yuan, Vol. 21, No. 4, 2019, pp. 592-600
Article Full Text PDF

9. Face Database Security Information Verification Based on Recognition Technology
Shumin Xue, Vol. 21, No. 4, 2019, pp. 601-606
Article Full Text PDF

10. Design of an Anonymous Lightweight Communication Protocol for Smart Grid and Its Implementation on 8-bit AVR and 32-bit ARM
Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, and Morteza Nikooghadam, Vol. 21, No. 4, 2019, pp. 607-617
Article Full Text PDF

11. A PUF-based Group Key Transfer Protocol for Bluetooth
Sensen Li, Bin Yu, and Yicai Huang, Vol. 21, No. 4, 2019, pp. 618-626
Article Full Text PDF

12. SPA Resistant Scalar Multiplication Using Pell Lucas Type Chain
Shuang-Gen Liu and Hui Zhao, Vol. 21, No. 4, 2019, pp. 627-634
Article Full Text PDF

13. Recent Trends in Development of DDoS Attacks and Protection Systems Against Them
Vladimir Galyaev, Evgenia Zykova, Dmitry Repin, and Denis Bokov, Vol. 21, No. 4, 2019, pp. 635-647
Article Full Text PDF

14. A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network
Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, and Yiqiao Cai, Vol. 21, No. 4, 2019, pp. 648-660
Article Full Text PDF

15. Security Analysis and Enhancements of A Remote User Authentication Scheme
Shou-Qi Cao, Qing Sun, and Li-Ling Cao, Vol. 21, No. 4, 2019, pp. 661-669
Article Full Text PDF

16. Detection Algorithm for Sinkhole Attack in Body Area Sensor Networks Using Local Information
Adnan Nadeem and Turki Alghamdi, Vol. 21, No. 4, 2019, pp. 670-679
Article Full Text PDF

17. A Searchable CP-ABE Privacy Preserving Scheme
Tao Feng, Xiaoyu Yin, Ye Lu, Junli Fang, and Fenghua Li, Vol. 21, No. 4, 2019, pp. 680-689
Article Full Text PDF

18. Implementation, Performance and Security Analysis for CryptoBin Algorithm
Ahmed H. Eltengy, Samaa M. Shohieb, Ali E. Takieldeen, and Mohamed S. Ksasy, Vol. 21, No. 4, 2019, pp. 690-698
Article Full Text PDF

19. Network Security Situation Assessment Based on Text SimHash in Big Data Environment
Pengwen Lin and Yonghong Chen, Vol. 21, No. 4, 2019, pp. 699-708
Article Full Text PDF

20. Comment on ``Improved Secure RSA Cryptosystem (ISRSAC) for Data Confidentiality in Cloud''
Chenglian Liu and Chieh-Wen Hsu, Vol. 21, No. 4, 2019, pp. 709-712
Article Full Text PDF

21. Subject index to volume 21 (2019)
Article Full Text PDF

22. Author index to volume 21 (2019)
Article Full Text PDF

23. Reviewer index to volume 21 (2019)
Article Full Text PDF

24. All Papers to volume 21 (2019)
Article Full Text PDF