Quick Search:

Volume: 21, No: 5 (September 1, 2019)

International Journal of Network Security

1. SPA Resistant Balanced Ternary Segmented Scalar Multiplication
Shuang-Gen Liu and Yuan-Yuan Ding, Vol. 21, No. 5, 2019, pp. 713-718
Article Full Text PDF

2. Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants
Hui Xia and Weiji Yang, Vol. 21, No. 5, 2019, pp. 719-727
Article Full Text PDF

3. An Efficient RFID Authentication Protocol Using Dynamic Identity
Shin-Yan Chiou, Vol. 21, No. 5, 2019, pp. 728-734
Article Full Text PDF

4. Security Evaluation of Computer Network Based on Hierarchy
Linbin Wen, Vol. 21, No. 5, 2019, pp. 735-740
Article Full Text PDF

5. Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction
Zhen-Hua Liu, Yuan-Yuan Li, Dong Yuan, and Yao-Hui Liu, Vol. 21, No. 5, 2019, pp. 741-750
Article Full Text PDF

6. A Novel SVD and LWT Based Robust Blind Audio Water-marking Scheme
Wenliang Wu, Vol. 21, No. 5, 2019, pp. 751-759
Article Full Text PDF

7. Identifying Anomalous Geographical Routing Based on the Network Delay
Evgeny Sagatov, Konstantin Lovtsov, and Andrei Sukhov, Vol. 21, No. 5, 2019, pp. 760-767
Article Full Text PDF

8. Network Security Threat Detection under Big Data by Using Machine Learning
Jinbao He, Jie Yang, Kangjian Ren, Wenjing Zhang, and Guiquan Li, Vol. 21, No. 5, 2019, pp. 768-773
Article Full Text PDF

9. Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security
Liyan Wang, Juntao Gao, and Xuelian Li, Vol. 21, No. 5, 2019, pp. 774-784
Article Full Text PDF

10. A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks
Ikjot Sain, Sherif Saad, and Arunita Jaekel, Vol. 21, No. 5, 2019, pp. 785-796
Article Full Text PDF

11. A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment
Shoulin Yin, Hang Li, and Lin Teng, Vol. 21, No. 5, 2019, pp. 797-803
Article Full Text PDF

12. A New Chi-square Distribution De-noising Method for Image Encryption
Shoulin Yin, Hang Li, and Lin Teng, Vol. 21, No. 5, 2019, pp. 804-811
Article Full Text PDF

13. Augmented Hill Cipher
AbdAllah A. ElHabshy, Vol. 21, No. 5, 2019, pp. 812-818
Article Full Text PDF

14. Leakage-resilient Attribute-based Encryption with CCA2 Security
Leyou Zhang and Yujie Shang, Vol. 21, No. 5, 2019, pp. 819-827
Article Full Text PDF

15. A Dynamic Location Privacy Protection Scheme Based on Cloud Storage
Li Li, Zhengjuan Lv, Xiaohong Tong, and Runhua Shi, Vol. 21, No. 5, 2019, pp. 828-834
Article Full Text PDF

16. Differentially Private Transmission Control Protocol Synchronize Packet Counts
Nenekazi Nokuthala P. Mkuzangwe and Fulufhelo Nelwamondo, Vol. 21, No. 5, 2019, pp. 835-842
Article Full Text PDF

17. A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree
Yang Sun, Shoulin Yin, Jie Liu, and Lin Teng, Vol. 21, No. 5, 2019, pp. 843-849
Article Full Text PDF

18. Forensic Analysis of Social Networks Based on Instagram
Ming Sang Chang and Chih Ping Yen, Vol. 21, No. 5, 2019, pp. 850-860
Article Full Text PDF

19. Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange
Ou Ruan, Zihao Wang, Qingping Wang, and Mingwu Zhang, Vol. 21, No. 5, 2019, pp. 861-871
Article Full Text PDF

20. Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server
Jiaxiang Yang, Yanping Li, and Yanli Ren, Vol. 21, No. 5, 2019, pp. 872-880
Article Full Text PDF