International Journal of Network Security | ||
1. | A Taxonomy of User Authentication Schemes for Multi-server Environments
|
|
Hung-Wei Yang, Hsieh-Tsen Pan, Yung-Hsing Chen, and Min-Shiang Hwang, Vol. 22, No. 3, 2020, pp. 365-372 Article Full Text PDF |
||
2. | Role Mining Algorithms Satisfied the Permission Cardinality Constraint
|
|
Jingyu Wang, Jingnan Dong, and Yuesheng Tan, Vol. 22, No. 3, 2020, pp. 373-382 Article Full Text PDF |
||
3. | Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications
|
|
Jianmeng Huang, Wenchao Huang, Fuyou Miao, and Yan Xiong, Vol. 22, No. 3, 2020, pp. 383-393 Article Full Text PDF |
||
4. | On the Security of a Practical Constant-Size Ring Signature Scheme
|
|
Jianhong Zhang, Wenle Bai, and Zhengtao Jiang, Vol. 22, No. 3, 2020, pp. 394-398 Article Full Text PDF |
||
5. | Timestamp Based Detection of Sybil Attack in VANET
|
|
Syed Mohd Faisal and Taskeen Zaidi, Vol. 22, No. 3, 2020, pp. 399-410 Article Full Text PDF |
||
6. | Static Analysis of Superfluous Network Transmissions in Android Applications
|
|
Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, and Yan Xiong, Vol. 22, No. 3, 2020, pp. 411-420 Article Full Text PDF |
||
7. | Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption
|
|
Shoulin Yin, Jie Liu, and Lin Teng, Vol. 22, No. 3, 2020, pp. 421-426 Article Full Text PDF |
||
8. | A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
|
|
Xu Zhao, Guangqiu Huang, and Reza Mousoli, Vol. 22, No. 3, 2020, pp. 427-436 Article Full Text PDF |
||
9. | A Novel Approach for Component based Application Logic Event Attack Modeling
|
|
Faisal Nabi, Jianming Yong, and Xiaohui Tao, Vol. 22, No. 3, 2020, pp. 437-443 Article Full Text PDF |
||
10. | Anonymous Transaction of Digital Currency Based on Blockchain
|
|
Yang Liu, Mingxing He, and Fangyuan Pu, Vol. 22, No. 3, 2020, pp. 444-450 Article Full Text PDF |
||
11. | Malware Traffic Classification Based on Recurrence Quantification Analysis
|
|
Zheng-Zhi Tang, Xue-Wen Zeng, Zhi-Chuan Guo, and Man-Gu Song, Vol. 22, No. 3, 2020, pp. 451-461 Article Full Text PDF |
||
12. | Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage
|
|
Qianlong Dang, Hua Ma, Zhenhua Liu, and Ying Xie, Vol. 22, No. 3, 2020, pp. 462-475 Article Full Text PDF |
||
13. | Design of Key Management Protocols for Internet of Things
|
|
Cungang Yang and Celia Li, Vol. 22, No. 3, 2020, pp. 476-485 Article Full Text PDF |
||
14. | Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems
|
|
Jing Bi, Shoulin Yin, Hang Li, Lin Teng, and Chu Zhao, Vol. 22, No. 3, 2020, pp. 486-491 Article Full Text PDF |
||
15. | Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture
|
|
Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang, Vol. 22, No. 3, 2020, pp. 492-503 Article Full Text PDF |
||
16. | Efficient Group Signature Scheme without Pairings
|
|
Ke Gu, Dianxing Liu, and Bo~Yin, Vol. 22, No. 3, 2020, pp. 504-515 Article Full Text PDF |
||
17. | Internet of Things: A Secure Cloud-based MANET Mobility Model
|
|
Tanweer Alam, Vol. 22, No. 3, 2020, pp. 516-522 Article Full Text PDF |
||
18. | Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem
|
|
He-Feng Chen, Chin-Chen Chang, and Kai-Meng Chen, Vol. 22, No. 3, 2020, pp. 523-533 Article Full Text PDF |
||
19. | Application of Novel Gabor-DCNN into RGB-D Face Recognition
|
|
Yuanyuan Xiao and Xiaoyao Xie, Vol. 22, No. 3, 2020, pp. 534-541 Article Full Text PDF |
||
20. | Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network
|
|
Munawar Hussain, Jiadong Ren, and Awais Akram, Vol. 22, No. 3, 2020, pp. 542-549 Article Full Text PDF |
||