| International Journal of Network Security | ||
| 1. | A Taxonomy of User Authentication Schemes for Multi-server Environments
|
|
| Hung-Wei Yang, Hsieh-Tsen Pan, Yung-Hsing Chen, and Min-Shiang Hwang, Vol. 22, No. 3, 2020, pp. 365-372 Article Full Text PDF |
||
| 2. | Role Mining Algorithms Satisfied the Permission Cardinality Constraint
|
|
| Jingyu Wang, Jingnan Dong, and Yuesheng Tan, Vol. 22, No. 3, 2020, pp. 373-382 Article Full Text PDF |
||
| 3. | Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications
|
|
| Jianmeng Huang, Wenchao Huang, Fuyou Miao, and Yan Xiong, Vol. 22, No. 3, 2020, pp. 383-393 Article Full Text PDF |
||
| 4. | On the Security of a Practical Constant-Size Ring Signature Scheme
|
|
| Jianhong Zhang, Wenle Bai, and Zhengtao Jiang, Vol. 22, No. 3, 2020, pp. 394-398 Article Full Text PDF |
||
| 5. | Timestamp Based Detection of Sybil Attack in VANET
|
|
| Syed Mohd Faisal and Taskeen Zaidi, Vol. 22, No. 3, 2020, pp. 399-410 Article Full Text PDF |
||
| 6. | Static Analysis of Superfluous Network Transmissions in Android Applications
|
|
| Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, and Yan Xiong, Vol. 22, No. 3, 2020, pp. 411-420 Article Full Text PDF |
||
| 7. | Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption
|
|
| Shoulin Yin, Jie Liu, and Lin Teng, Vol. 22, No. 3, 2020, pp. 421-426 Article Full Text PDF |
||
| 8. | A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
|
|
| Xu Zhao, Guangqiu Huang, and Reza Mousoli, Vol. 22, No. 3, 2020, pp. 427-436 Article Full Text PDF |
||
| 9. | A Novel Approach for Component based Application Logic Event Attack Modeling
|
|
| Faisal Nabi, Jianming Yong, and Xiaohui Tao, Vol. 22, No. 3, 2020, pp. 437-443 Article Full Text PDF |
||
| 10. | Anonymous Transaction of Digital Currency Based on Blockchain
|
|
| Yang Liu, Mingxing He, and Fangyuan Pu, Vol. 22, No. 3, 2020, pp. 444-450 Article Full Text PDF |
||
| 11. | Malware Traffic Classification Based on Recurrence Quantification Analysis
|
|
| Zheng-Zhi Tang, Xue-Wen Zeng, Zhi-Chuan Guo, and Man-Gu Song, Vol. 22, No. 3, 2020, pp. 451-461 Article Full Text PDF |
||
| 12. | Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage
|
|
| Qianlong Dang, Hua Ma, Zhenhua Liu, and Ying Xie, Vol. 22, No. 3, 2020, pp. 462-475 Article Full Text PDF |
||
| 13. | Design of Key Management Protocols for Internet of Things
|
|
| Cungang Yang and Celia Li, Vol. 22, No. 3, 2020, pp. 476-485 Article Full Text PDF |
||
| 14. | Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems
|
|
| Jing Bi, Shoulin Yin, Hang Li, Lin Teng, and Chu Zhao, Vol. 22, No. 3, 2020, pp. 486-491 Article Full Text PDF |
||
| 15. | Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture
|
|
| Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang, Vol. 22, No. 3, 2020, pp. 492-503 Article Full Text PDF |
||
| 16. | Efficient Group Signature Scheme without Pairings
|
|
| Ke Gu, Dianxing Liu, and Bo~Yin, Vol. 22, No. 3, 2020, pp. 504-515 Article Full Text PDF |
||
| 17. | Internet of Things: A Secure Cloud-based MANET Mobility Model
|
|
| Tanweer Alam, Vol. 22, No. 3, 2020, pp. 516-522 Article Full Text PDF |
||
| 18. | Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem
|
|
| He-Feng Chen, Chin-Chen Chang, and Kai-Meng Chen, Vol. 22, No. 3, 2020, pp. 523-533 Article Full Text PDF |
||
| 19. | Application of Novel Gabor-DCNN into RGB-D Face Recognition
|
|
| Yuanyuan Xiao and Xiaoyao Xie, Vol. 22, No. 3, 2020, pp. 534-541 Article Full Text PDF |
||
| 20. | Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network
|
|
| Munawar Hussain, Jiadong Ren, and Awais Akram, Vol. 22, No. 3, 2020, pp. 542-549 Article Full Text PDF |
||