International Journal of Network Security | ||
1. | Packet Watermarking With ECG Biological Feature
|
|
Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, and Xiangmin Guo, Vol. 22, No. 1, 2020, pp. 1-11 Article Full Text PDF |
||
2. | Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce
|
|
Jia-Qi Wang, Yun-Feng Zhang, and Dao-Wei Liu, Vol. 22, No. 1, 2020, pp. 12-23 Article Full Text PDF |
||
3. | Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing
|
|
Hua Ma, Guo-Hua Tian, and Lin-Chao Zhang, Vol. 22, No. 1, 2020, pp. 24-35 Article Full Text PDF |
||
4. | A Note On One Secure Data Self-Destructing Scheme In Cloud Computing
|
|
Lihua Liu, Yang Li, Zhengjun Cao, and Zhen Chen, Vol. 22, No. 1, 2020, pp. 36-40 Article Full Text PDF |
||
5. | The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks
|
|
Shahrzad Sedaghat, Vol. 22, No. 1, 2020, pp. 41-53 Article Full Text PDF |
||
6. | A Formal Framework of Shielding Systems by Stepwise Refinement
|
|
Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, and Yan Xiong, Vol. 22, No. 1, 2020, pp. 54-67 Article Full Text PDF |
||
7. | StegoNote: Steganography in Guitar Music Using Note Modulation
|
|
Hui Tian, Zhaohua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, and Yiqiao Cai, Vol. 22, No. 1, 2020, pp. 68-79 Article Full Text PDF |
||
8. | Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model
|
|
Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, and Bo Meng, Vol. 22, No. 1, 2020, pp. 80-92 Article Full Text PDF |
||
9. | Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace
|
|
Budi Gunawan and Barito Mulyo Ratmono, Vol. 22, No. 1, 2020, pp. 93-101 Article Full Text PDF |
||
10. | Certificateless Ring Signcryption Scheme from Pairings
|
|
Hui Guo and Lunzhi Deng, Vol. 22, No. 1, 2020, pp. 102-111 Article Full Text PDF |
||
11. | A Modified Advanced Encryption Standard for Data Security
|
|
Lin Teng, Hang Li, Shoulin Yin, and Yang Sun, Vol. 22, No. 1, 2020, pp. 112-117 Article Full Text PDF |
||
12. | Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
|
|
Cossi Blaise Avoussoukpo, Chunxiang Xu, and Marius Tchenagnon, Vol. 22, No. 1, 2020, pp. 118-125 Article Full Text PDF |
||
13. | Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images
|
|
Xiaofeng Chen and Wenlong Guo, Vol. 22, No. 1, 2020, pp. 126-135 Article Full Text PDF |
||
14. | A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information
|
|
Ying-Chih Tseng and Heng Ma, Vol. 22, No. 1, 2020, pp. 136-144 Article Full Text PDF |
||
15. | Research on Security of Mobile Communication Information Transmission Based on Heterogeneous Network
|
|
Jing Chen, Feng Zhao, and Haiyan Xing, Vol. 22, No. 1, 2020, pp. 145-149 Article Full Text PDF |
||
16. | Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
|
|
Shidong Zhang, Tongjiang Yan, Yuhua Sun, and Lianhai Wang, Vol. 22, No. 1, 2020, pp. 150-154 Article Full Text PDF |
||
17. | An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain
|
|
Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, and Yang Sun, Vol. 22, No. 1, 2020, pp. 155-160 Article Full Text PDF |
||
18. | Attribute Based Encryption with Efficient Revocation from Lattices
|
|
Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu, Vol. 22, No. 1, 2020, pp. 161-170 Article Full Text PDF |
||
19. | Correlation Functions of m-Sequences of Different Lengths
|
|
Zepeng Zhuo, Jinfeng Chong, and Lei Yu, Vol. 22, No. 1, 2020, pp. 171-176 Article Full Text PDF |
||
20. | Network Security Situation Prediction Based on Grey Relational Analysis and Support Vector Machine Algorithm
|
|
Xiaoyi Hong, Vol. 22, No. 1, 2020, pp. 177-182 Article Full Text PDF |
||