| International Journal of Network Security | ||
| 1. | SPA Resistant Balanced Ternary Segmented Scalar Multiplication
|
|
| Shuang-Gen Liu and Yuan-Yuan Ding, Vol. 21, No. 5, 2019, pp. 713-718 Article Full Text PDF |
||
| 2. | Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants
|
|
| Hui Xia and Weiji Yang, Vol. 21, No. 5, 2019, pp. 719-727 Article Full Text PDF |
||
| 3. | An Efficient RFID Authentication Protocol Using Dynamic Identity
|
|
| Shin-Yan Chiou, Vol. 21, No. 5, 2019, pp. 728-734 Article Full Text PDF |
||
| 4. | Security Evaluation of Computer Network Based on Hierarchy
|
|
| Linbin Wen, Vol. 21, No. 5, 2019, pp. 735-740 Article Full Text PDF |
||
| 5. | Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction
|
|
| Zhen-Hua Liu, Yuan-Yuan Li, Dong Yuan, and Yao-Hui Liu, Vol. 21, No. 5, 2019, pp. 741-750 Article Full Text PDF |
||
| 6. | A Novel SVD and LWT Based Robust Blind Audio Water-marking Scheme
|
|
| Wenliang Wu, Vol. 21, No. 5, 2019, pp. 751-759 Article Full Text PDF |
||
| 7. | Identifying Anomalous Geographical Routing Based on the Network Delay
|
|
| Evgeny Sagatov, Konstantin Lovtsov, and Andrei Sukhov, Vol. 21, No. 5, 2019, pp. 760-767 Article Full Text PDF |
||
| 8. | Network Security Threat Detection under Big Data by Using Machine Learning
|
|
| Jinbao He, Jie Yang, Kangjian Ren, Wenjing Zhang, and Guiquan Li, Vol. 21, No. 5, 2019, pp. 768-773 Article Full Text PDF |
||
| 9. | Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security
|
|
| Liyan Wang, Juntao Gao, and Xuelian Li, Vol. 21, No. 5, 2019, pp. 774-784 Article Full Text PDF |
||
| 10. | A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks
|
|
| Ikjot Sain, Sherif Saad, and Arunita Jaekel, Vol. 21, No. 5, 2019, pp. 785-796 Article Full Text PDF |
||
| 11. | A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment
|
|
| Shoulin Yin, Hang Li, and Lin Teng, Vol. 21, No. 5, 2019, pp. 797-803 Article Full Text PDF |
||
| 12. | A New Chi-square Distribution De-noising Method for Image Encryption
|
|
| Shoulin Yin, Hang Li, and Lin Teng, Vol. 21, No. 5, 2019, pp. 804-811 Article Full Text PDF |
||
| 13. | Augmented Hill Cipher
|
|
| AbdAllah A. ElHabshy, Vol. 21, No. 5, 2019, pp. 812-818 Article Full Text PDF |
||
| 14. | Leakage-resilient Attribute-based Encryption with CCA2 Security
|
|
| Leyou Zhang and Yujie Shang, Vol. 21, No. 5, 2019, pp. 819-827 Article Full Text PDF |
||
| 15. | A Dynamic Location Privacy Protection Scheme Based on Cloud Storage
|
|
| Li Li, Zhengjuan Lv, Xiaohong Tong, and Runhua Shi, Vol. 21, No. 5, 2019, pp. 828-834 Article Full Text PDF |
||
| 16. | Differentially Private Transmission Control Protocol Synchronize Packet Counts
|
|
| Nenekazi Nokuthala P. Mkuzangwe and Fulufhelo Nelwamondo, Vol. 21, No. 5, 2019, pp. 835-842 Article Full Text PDF |
||
| 17. | A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree
|
|
| Yang Sun, Shoulin Yin, Jie Liu, and Lin Teng, Vol. 21, No. 5, 2019, pp. 843-849 Article Full Text PDF |
||
| 18. | Forensic Analysis of Social Networks Based on Instagram
|
|
| Ming Sang Chang and Chih Ping Yen, Vol. 21, No. 5, 2019, pp. 850-860 Article Full Text PDF |
||
| 19. | Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange
|
|
| Ou Ruan, Zihao Wang, Qingping Wang, and Mingwu Zhang, Vol. 21, No. 5, 2019, pp. 861-871 Article Full Text PDF |
||
| 20. | Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server
|
|
| Jiaxiang Yang, Yanping Li, and Yanli Ren, Vol. 21, No. 5, 2019, pp. 872-880 Article Full Text PDF |
||