International Journal of Network Security | ||
1. | SPA Resistant Balanced Ternary Segmented Scalar Multiplication
|
|
Shuang-Gen Liu and Yuan-Yuan Ding, Vol. 21, No. 5, 2019, pp. 713-718 Article Full Text PDF |
||
2. | Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants
|
|
Hui Xia and Weiji Yang, Vol. 21, No. 5, 2019, pp. 719-727 Article Full Text PDF |
||
3. | An Efficient RFID Authentication Protocol Using Dynamic Identity
|
|
Shin-Yan Chiou, Vol. 21, No. 5, 2019, pp. 728-734 Article Full Text PDF |
||
4. | Security Evaluation of Computer Network Based on Hierarchy
|
|
Linbin Wen, Vol. 21, No. 5, 2019, pp. 735-740 Article Full Text PDF |
||
5. | Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction
|
|
Zhen-Hua Liu, Yuan-Yuan Li, Dong Yuan, and Yao-Hui Liu, Vol. 21, No. 5, 2019, pp. 741-750 Article Full Text PDF |
||
6. | A Novel SVD and LWT Based Robust Blind Audio Water-marking Scheme
|
|
Wenliang Wu, Vol. 21, No. 5, 2019, pp. 751-759 Article Full Text PDF |
||
7. | Identifying Anomalous Geographical Routing Based on the Network Delay
|
|
Evgeny Sagatov, Konstantin Lovtsov, and Andrei Sukhov, Vol. 21, No. 5, 2019, pp. 760-767 Article Full Text PDF |
||
8. | Network Security Threat Detection under Big Data by Using Machine Learning
|
|
Jinbao He, Jie Yang, Kangjian Ren, Wenjing Zhang, and Guiquan Li, Vol. 21, No. 5, 2019, pp. 768-773 Article Full Text PDF |
||
9. | Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security
|
|
Liyan Wang, Juntao Gao, and Xuelian Li, Vol. 21, No. 5, 2019, pp. 774-784 Article Full Text PDF |
||
10. | A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks
|
|
Ikjot Sain, Sherif Saad, and Arunita Jaekel, Vol. 21, No. 5, 2019, pp. 785-796 Article Full Text PDF |
||
11. | A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment
|
|
Shoulin Yin, Hang Li, and Lin Teng, Vol. 21, No. 5, 2019, pp. 797-803 Article Full Text PDF |
||
12. | A New Chi-square Distribution De-noising Method for Image Encryption
|
|
Shoulin Yin, Hang Li, and Lin Teng, Vol. 21, No. 5, 2019, pp. 804-811 Article Full Text PDF |
||
13. | Augmented Hill Cipher
|
|
AbdAllah A. ElHabshy, Vol. 21, No. 5, 2019, pp. 812-818 Article Full Text PDF |
||
14. | Leakage-resilient Attribute-based Encryption with CCA2 Security
|
|
Leyou Zhang and Yujie Shang, Vol. 21, No. 5, 2019, pp. 819-827 Article Full Text PDF |
||
15. | A Dynamic Location Privacy Protection Scheme Based on Cloud Storage
|
|
Li Li, Zhengjuan Lv, Xiaohong Tong, and Runhua Shi, Vol. 21, No. 5, 2019, pp. 828-834 Article Full Text PDF |
||
16. | Differentially Private Transmission Control Protocol Synchronize Packet Counts
|
|
Nenekazi Nokuthala P. Mkuzangwe and Fulufhelo Nelwamondo, Vol. 21, No. 5, 2019, pp. 835-842 Article Full Text PDF |
||
17. | A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree
|
|
Yang Sun, Shoulin Yin, Jie Liu, and Lin Teng, Vol. 21, No. 5, 2019, pp. 843-849 Article Full Text PDF |
||
18. | Forensic Analysis of Social Networks Based on Instagram
|
|
Ming Sang Chang and Chih Ping Yen, Vol. 21, No. 5, 2019, pp. 850-860 Article Full Text PDF |
||
19. | Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange
|
|
Ou Ruan, Zihao Wang, Qingping Wang, and Mingwu Zhang, Vol. 21, No. 5, 2019, pp. 861-871 Article Full Text PDF |
||
20. | Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server
|
|
Jiaxiang Yang, Yanping Li, and Yanli Ren, Vol. 21, No. 5, 2019, pp. 872-880 Article Full Text PDF |
||