Quick Search:

Volume: 22, No: 1 (January 1, 2020)

International Journal of Network Security

1. Packet Watermarking With ECG Biological Feature
Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, and Xiangmin Guo, Vol. 22, No. 1, 2020, pp. 1-11
Article Full Text PDF

2. Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce
Jia-Qi Wang, Yun-Feng Zhang, and Dao-Wei Liu, Vol. 22, No. 1, 2020, pp. 12-23
Article Full Text PDF

3. Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing
Hua Ma, Guo-Hua Tian, and Lin-Chao Zhang, Vol. 22, No. 1, 2020, pp. 24-35
Article Full Text PDF

4. A Note On One Secure Data Self-Destructing Scheme In Cloud Computing
Lihua Liu, Yang Li, Zhengjun Cao, and Zhen Chen, Vol. 22, No. 1, 2020, pp. 36-40
Article Full Text PDF

5. The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks
Shahrzad Sedaghat, Vol. 22, No. 1, 2020, pp. 41-53
Article Full Text PDF

6. A Formal Framework of Shielding Systems by Stepwise Refinement
Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, and Yan Xiong, Vol. 22, No. 1, 2020, pp. 54-67
Article Full Text PDF

7. StegoNote: Steganography in Guitar Music Using Note Modulation
Hui Tian, Zhaohua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, and Yiqiao Cai, Vol. 22, No. 1, 2020, pp. 68-79
Article Full Text PDF

8. Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model
Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, and Bo Meng, Vol. 22, No. 1, 2020, pp. 80-92
Article Full Text PDF

9. Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace
Budi Gunawan and Barito Mulyo Ratmono, Vol. 22, No. 1, 2020, pp. 93-101
Article Full Text PDF

10. Certificateless Ring Signcryption Scheme from Pairings
Hui Guo and Lunzhi Deng, Vol. 22, No. 1, 2020, pp. 102-111
Article Full Text PDF

11. A Modified Advanced Encryption Standard for Data Security
Lin Teng, Hang Li, Shoulin Yin, and Yang Sun, Vol. 22, No. 1, 2020, pp. 112-117
Article Full Text PDF

12. Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
Cossi Blaise Avoussoukpo, Chunxiang Xu, and Marius Tchenagnon, Vol. 22, No. 1, 2020, pp. 118-125
Article Full Text PDF

13. Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images
Xiaofeng Chen and Wenlong Guo, Vol. 22, No. 1, 2020, pp. 126-135
Article Full Text PDF

14. A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information
Ying-Chih Tseng and Heng Ma, Vol. 22, No. 1, 2020, pp. 136-144
Article Full Text PDF

15. Research on Security of Mobile Communication Information Transmission Based on Heterogeneous Network
Jing Chen, Feng Zhao, and Haiyan Xing, Vol. 22, No. 1, 2020, pp. 145-149
Article Full Text PDF

16. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
Shidong Zhang, Tongjiang Yan, Yuhua Sun, and Lianhai Wang, Vol. 22, No. 1, 2020, pp. 150-154
Article Full Text PDF

17. An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain
Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, and Yang Sun, Vol. 22, No. 1, 2020, pp. 155-160
Article Full Text PDF

18. Attribute Based Encryption with Efficient Revocation from Lattices
Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu, Vol. 22, No. 1, 2020, pp. 161-170
Article Full Text PDF

19. Correlation Functions of m-Sequences of Different Lengths
Zepeng Zhuo, Jinfeng Chong, and Lei Yu, Vol. 22, No. 1, 2020, pp. 171-176
Article Full Text PDF

20. Network Security Situation Prediction Based on Grey Relational Analysis and Support Vector Machine Algorithm
Xiaoyi Hong, Vol. 22, No. 1, 2020, pp. 177-182
Article Full Text PDF