| International Journal of Network Security | ||
| 1. | Joint Source-Relay Selection Scheme for Cooperative Networks under Eavesdropping Environment
|
|
| Jianbin Xue, Heng Zhu, Xiaoming Liao, and Zhe Su, Vol. 21, No. 6, 2019, pp. 881-888 Article Full Text PDF |
||
| 2. | An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol
|
|
| Gao-Feng Shen, Shu-Min Gu, and Dao-Wei Liu, Vol. 21, No. 6, 2019, pp. 889-896 Article Full Text PDF |
||
| 3. | Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography
|
|
| Majid Bayat, Mohammad Beheshti Atashgah, Morteza Barari, and Mohammad Reza Aref, Vol. 21, No. 6, 2019, pp. 897-911 Article Full Text PDF |
||
| 4. | Identity Management Security Authentication Based on Blockchain Technologies
|
|
| Pengfei Fan, Yazhen Liu, Jiyang Zhu, Xiongfei Fan, and Liping Wen, Vol. 21, No. 6, 2019, pp. 912-917 Article Full Text PDF |
||
| 5. | Secure High Capacity Data Hiding Scheme based on Reference Matrix
|
|
| Xiao-Shuang Li, Chin-Chen Chang, Ming-Xing He, and Chia-Chen Lin, Vol. 21, No. 6, 2019, pp. 918-929 Article Full Text PDF |
||
| 6. | Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks
|
|
| N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah, Vol. 21, No. 6, 2019, pp. 930-936 Article Full Text PDF |
||
| 7. | A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics
|
|
| Yong-Bing Zhang, Qiu-Yu Zhang, Zong-Yi Li, Yan Yan, and Mo-Yi Zhang, Vol. 21, No. 6, 2019, pp. 937-946 Article Full Text PDF |
||
| 8. | Efficient Near-Duplicate Document Detection Using Consistent Weighted Sampling Filter
|
|
| Xinpan Yuan, Songlin Wang, Cheng Peng, and Chengyuan Zhang, Vol. 21, No. 6, 2019, pp. 947-956 Article Full Text PDF |
||
| 9. | A Provably Secure Group Authentication Protocol for Various LTE Networks
|
|
| Boriphat Kijjabuncha and Pipat Hiranvanichakorn, Vol. 21, No. 6, 2019, pp. 957-970 Article Full Text PDF |
||
| 10. | URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks
|
|
| Putra Wanda and Huang Jin Jie, Vol. 21, No. 6, 2019, pp. 971-978 Article Full Text PDF |
||
| 11. | Detection of Network Protection Security Vulnerability Intrusion Based on Data Mining
|
|
| Jinming Zhang, Vol. 21, No. 6, 2019, pp. 979-984 Article Full Text PDF |
||
| 12. | Quadrivium: A Trivium-Inspired Pseudorandom Number Generator
|
|
| Latoya Jackson and Yesem Kurt Peker, Vol. 21, No. 6, 2019, pp. 985-992 Article Full Text PDF |
||
| 13. | Cryptanalysis and Improvement of a Smart Card Based Authentication Scheme for Multi-server Architecture Using ECC
|
|
| Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang, Vol. 21, No. 6, 2019, pp. 993-1002 Article Full Text PDF |
||
| 14. | Research on Cloud Service Security Measurement Based on Information Entropy
|
|
| Tilei Gao, Tong Li, Rong Jiang, Ming Yang, and Rui Zhu, Vol. 21, No. 6, 2019, pp. 1003-1013 Article Full Text PDF |
||
| 15. | Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
|
|
| Wei-Liang Tai, Ya-Fen Chang, and Po-Lin Hou, Vol. 21, No. 6, 2019, pp. 1014-1020 Article Full Text PDF |
||
| 16. | A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks
|
|
| Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He and Chengyue Chang, Vol. 21, No. 6, 2019, pp. 1021-1030 Article Full Text PDF |
||
| 17. | Android Malware Detection Approaches in Combination with Static and Dynamic Features
|
|
| Ming-Yang Su, Jer-Yuan Chang, and Kek-Tung Fung, Vol. 21, No. 6, 2019, pp. 1031-1041 Article Full Text PDF |
||
| 18. | Probabilistic RSA with Homomorphism and Its Applications
|
|
| Yaling Geng, Shundong Li, and Sufang Zhou, Vol. 21, No. 6, 2019, pp. 1042-1053 Article Full Text PDF |
||
| 19. | Cryptanalysis of An Improved Predicate Encryption Scheme from LWE
|
|
| Chengbo Xu, Vol. 21, No. 6, 2019, pp. 1054-1061 Article Full Text PDF |
||
| 20. | Research on Batch Verification Schemes for Identifying Illegal Signatures
|
|
| Hsieh-Tsen Pan, Eko Fajar Cahyadi, Shu-Fen Chiou, and Min-Shiang Hwang, Vol. 21, No. 6, 2019, pp. 1062-1070 Article Full Text PDF |
||
| 21. | Privacy-preserving Computational Geometry
|
|
| Qiong Wei, Shundong Li, Wenli Wang, and Yanjing Yang, Vol. 21, No. 6, 2019, pp. 1071-1080 Article Full Text PDF |
||
| 24. | Reviewer index to volume 21 (2019) Reviewers (Volume 21, 2019) | |