Quick Search:

Volume: 21, No: 6 (November 1, 2019)

International Journal of Network Security

1. Joint Source-Relay Selection Scheme for Cooperative Networks under Eavesdropping Environment
Jianbin Xue, Heng Zhu, Xiaoming Liao, and Zhe Su, Vol. 21, No. 6, 2019, pp. 881-888
Article Full Text PDF

2. An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol
Gao-Feng Shen, Shu-Min Gu, and Dao-Wei Liu, Vol. 21, No. 6, 2019, pp. 889-896
Article Full Text PDF

3. Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography
Majid Bayat, Mohammad Beheshti Atashgah, Morteza Barari, and Mohammad Reza Aref, Vol. 21, No. 6, 2019, pp. 897-911
Article Full Text PDF

4. Identity Management Security Authentication Based on Blockchain Technologies
Pengfei Fan, Yazhen Liu, Jiyang Zhu, Xiongfei Fan, and Liping Wen, Vol. 21, No. 6, 2019, pp. 912-917
Article Full Text PDF

5. Secure High Capacity Data Hiding Scheme based on Reference Matrix
Xiao-Shuang Li, Chin-Chen Chang, Ming-Xing He, and Chia-Chen Lin, Vol. 21, No. 6, 2019, pp. 918-929
Article Full Text PDF

6. Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks
N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah, Vol. 21, No. 6, 2019, pp. 930-936
Article Full Text PDF

7. A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics
Yong-Bing Zhang, Qiu-Yu Zhang, Zong-Yi Li, Yan Yan, and Mo-Yi Zhang, Vol. 21, No. 6, 2019, pp. 937-946
Article Full Text PDF

8. Efficient Near-Duplicate Document Detection Using Consistent Weighted Sampling Filter
Xinpan Yuan, Songlin Wang, Cheng Peng, and Chengyuan Zhang, Vol. 21, No. 6, 2019, pp. 947-956
Article Full Text PDF

9. A Provably Secure Group Authentication Protocol for Various LTE Networks
Boriphat Kijjabuncha and Pipat Hiranvanichakorn, Vol. 21, No. 6, 2019, pp. 957-970
Article Full Text PDF

10. URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks
Putra Wanda and Huang Jin Jie, Vol. 21, No. 6, 2019, pp. 971-978
Article Full Text PDF

11. Detection of Network Protection Security Vulnerability Intrusion Based on Data Mining
Jinming Zhang, Vol. 21, No. 6, 2019, pp. 979-984
Article Full Text PDF

12. Quadrivium: A Trivium-Inspired Pseudorandom Number Generator
Latoya Jackson and Yesem Kurt Peker, Vol. 21, No. 6, 2019, pp. 985-992
Article Full Text PDF

13. Cryptanalysis and Improvement of a Smart Card Based Authentication Scheme for Multi-server Architecture Using ECC
Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang, Vol. 21, No. 6, 2019, pp. 993-1002
Article Full Text PDF

14. Research on Cloud Service Security Measurement Based on Information Entropy
Tilei Gao, Tong Li, Rong Jiang, Ming Yang, and Rui Zhu, Vol. 21, No. 6, 2019, pp. 1003-1013
Article Full Text PDF

15. Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
Wei-Liang Tai, Ya-Fen Chang, and Po-Lin Hou, Vol. 21, No. 6, 2019, pp. 1014-1020
Article Full Text PDF

16. A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks
Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He and Chengyue Chang, Vol. 21, No. 6, 2019, pp. 1021-1030
Article Full Text PDF

17. Android Malware Detection Approaches in Combination with Static and Dynamic Features
Ming-Yang Su, Jer-Yuan Chang, and Kek-Tung Fung, Vol. 21, No. 6, 2019, pp. 1031-1041
Article Full Text PDF

18. Probabilistic RSA with Homomorphism and Its Applications
Yaling Geng, Shundong Li, and Sufang Zhou, Vol. 21, No. 6, 2019, pp. 1042-1053
Article Full Text PDF

19. Cryptanalysis of An Improved Predicate Encryption Scheme from LWE
Chengbo Xu, Vol. 21, No. 6, 2019, pp. 1054-1061
Article Full Text PDF

20. Research on Batch Verification Schemes for Identifying Illegal Signatures
Hsieh-Tsen Pan, Eko Fajar Cahyadi, Shu-Fen Chiou, and Min-Shiang Hwang, Vol. 21, No. 6, 2019, pp. 1062-1070
Article Full Text PDF

21. Privacy-preserving Computational Geometry
Qiong Wei, Shundong Li, Wenli Wang, and Yanjing Yang, Vol. 21, No. 6, 2019, pp. 1071-1080
Article Full Text PDF

24. Reviewer index to volume 21 (2019) Reviewers (Volume 21, 2019)