International Journal of Network Security | ||
1. | Joint Source-Relay Selection Scheme for Cooperative Networks under Eavesdropping Environment
|
|
Jianbin Xue, Heng Zhu, Xiaoming Liao, and Zhe Su, Vol. 21, No. 6, 2019, pp. 881-888 Article Full Text PDF |
||
2. | An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol
|
|
Gao-Feng Shen, Shu-Min Gu, and Dao-Wei Liu, Vol. 21, No. 6, 2019, pp. 889-896 Article Full Text PDF |
||
3. | Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography
|
|
Majid Bayat, Mohammad Beheshti Atashgah, Morteza Barari, and Mohammad Reza Aref, Vol. 21, No. 6, 2019, pp. 897-911 Article Full Text PDF |
||
4. | Identity Management Security Authentication Based on Blockchain Technologies
|
|
Pengfei Fan, Yazhen Liu, Jiyang Zhu, Xiongfei Fan, and Liping Wen, Vol. 21, No. 6, 2019, pp. 912-917 Article Full Text PDF |
||
5. | Secure High Capacity Data Hiding Scheme based on Reference Matrix
|
|
Xiao-Shuang Li, Chin-Chen Chang, Ming-Xing He, and Chia-Chen Lin, Vol. 21, No. 6, 2019, pp. 918-929 Article Full Text PDF |
||
6. | Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks
|
|
N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah, Vol. 21, No. 6, 2019, pp. 930-936 Article Full Text PDF |
||
7. | A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics
|
|
Yong-Bing Zhang, Qiu-Yu Zhang, Zong-Yi Li, Yan Yan, and Mo-Yi Zhang, Vol. 21, No. 6, 2019, pp. 937-946 Article Full Text PDF |
||
8. | Efficient Near-Duplicate Document Detection Using Consistent Weighted Sampling Filter
|
|
Xinpan Yuan, Songlin Wang, Cheng Peng, and Chengyuan Zhang, Vol. 21, No. 6, 2019, pp. 947-956 Article Full Text PDF |
||
9. | A Provably Secure Group Authentication Protocol for Various LTE Networks
|
|
Boriphat Kijjabuncha and Pipat Hiranvanichakorn, Vol. 21, No. 6, 2019, pp. 957-970 Article Full Text PDF |
||
10. | URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks
|
|
Putra Wanda and Huang Jin Jie, Vol. 21, No. 6, 2019, pp. 971-978 Article Full Text PDF |
||
11. | Detection of Network Protection Security Vulnerability Intrusion Based on Data Mining
|
|
Jinming Zhang, Vol. 21, No. 6, 2019, pp. 979-984 Article Full Text PDF |
||
12. | Quadrivium: A Trivium-Inspired Pseudorandom Number Generator
|
|
Latoya Jackson and Yesem Kurt Peker, Vol. 21, No. 6, 2019, pp. 985-992 Article Full Text PDF |
||
13. | Cryptanalysis and Improvement of a Smart Card Based Authentication Scheme for Multi-server Architecture Using ECC
|
|
Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang, Vol. 21, No. 6, 2019, pp. 993-1002 Article Full Text PDF |
||
14. | Research on Cloud Service Security Measurement Based on Information Entropy
|
|
Tilei Gao, Tong Li, Rong Jiang, Ming Yang, and Rui Zhu, Vol. 21, No. 6, 2019, pp. 1003-1013 Article Full Text PDF |
||
15. | Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
|
|
Wei-Liang Tai, Ya-Fen Chang, and Po-Lin Hou, Vol. 21, No. 6, 2019, pp. 1014-1020 Article Full Text PDF |
||
16. | A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks
|
|
Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He and Chengyue Chang, Vol. 21, No. 6, 2019, pp. 1021-1030 Article Full Text PDF |
||
17. | Android Malware Detection Approaches in Combination with Static and Dynamic Features
|
|
Ming-Yang Su, Jer-Yuan Chang, and Kek-Tung Fung, Vol. 21, No. 6, 2019, pp. 1031-1041 Article Full Text PDF |
||
18. | Probabilistic RSA with Homomorphism and Its Applications
|
|
Yaling Geng, Shundong Li, and Sufang Zhou, Vol. 21, No. 6, 2019, pp. 1042-1053 Article Full Text PDF |
||
19. | Cryptanalysis of An Improved Predicate Encryption Scheme from LWE
|
|
Chengbo Xu, Vol. 21, No. 6, 2019, pp. 1054-1061 Article Full Text PDF |
||
20. | Research on Batch Verification Schemes for Identifying Illegal Signatures
|
|
Hsieh-Tsen Pan, Eko Fajar Cahyadi, Shu-Fen Chiou, and Min-Shiang Hwang, Vol. 21, No. 6, 2019, pp. 1062-1070 Article Full Text PDF |
||
21. | Privacy-preserving Computational Geometry
|
|
Qiong Wei, Shundong Li, Wenli Wang, and Yanjing Yang, Vol. 21, No. 6, 2019, pp. 1071-1080 Article Full Text PDF |
||
24. | Reviewer index to volume 21 (2019) Reviewers (Volume 21, 2019) | |