Quick Search:

Volume: 22, No: 3 (May 1, 2020)

International Journal of Network Security

1. A Taxonomy of User Authentication Schemes for Multi-server Environments
Hung-Wei Yang, Hsieh-Tsen Pan, Yung-Hsing Chen, and Min-Shiang Hwang, Vol. 22, No. 3, 2020, pp. 365-372
Article Full Text PDF

2. Role Mining Algorithms Satisfied the Permission Cardinality Constraint
Jingyu Wang, Jingnan Dong, and Yuesheng Tan, Vol. 22, No. 3, 2020, pp. 373-382
Article Full Text PDF

3. Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications
Jianmeng Huang, Wenchao Huang, Fuyou Miao, and Yan Xiong, Vol. 22, No. 3, 2020, pp. 383-393
Article Full Text PDF

4. On the Security of a Practical Constant-Size Ring Signature Scheme
Jianhong Zhang, Wenle Bai, and Zhengtao Jiang, Vol. 22, No. 3, 2020, pp. 394-398
Article Full Text PDF

5. Timestamp Based Detection of Sybil Attack in VANET
Syed Mohd Faisal and Taskeen Zaidi, Vol. 22, No. 3, 2020, pp. 399-410
Article Full Text PDF

6. Static Analysis of Superfluous Network Transmissions in Android Applications
Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, and Yan Xiong, Vol. 22, No. 3, 2020, pp. 411-420
Article Full Text PDF

7. Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption
Shoulin Yin, Jie Liu, and Lin Teng, Vol. 22, No. 3, 2020, pp. 421-426
Article Full Text PDF

8. A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
Xu Zhao, Guangqiu Huang, and Reza Mousoli, Vol. 22, No. 3, 2020, pp. 427-436
Article Full Text PDF

9. A Novel Approach for Component based Application Logic Event Attack Modeling
Faisal Nabi, Jianming Yong, and Xiaohui Tao, Vol. 22, No. 3, 2020, pp. 437-443
Article Full Text PDF

10. Anonymous Transaction of Digital Currency Based on Blockchain
Yang Liu, Mingxing He, and Fangyuan Pu, Vol. 22, No. 3, 2020, pp. 444-450
Article Full Text PDF

11. Malware Traffic Classification Based on Recurrence Quantification Analysis
Zheng-Zhi Tang, Xue-Wen Zeng, Zhi-Chuan Guo, and Man-Gu Song, Vol. 22, No. 3, 2020, pp. 451-461
Article Full Text PDF

12. Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage
Qianlong Dang, Hua Ma, Zhenhua Liu, and Ying Xie, Vol. 22, No. 3, 2020, pp. 462-475
Article Full Text PDF

13. Design of Key Management Protocols for Internet of Things
Cungang Yang and Celia Li, Vol. 22, No. 3, 2020, pp. 476-485
Article Full Text PDF

14. Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems
Jing Bi, Shoulin Yin, Hang Li, Lin Teng, and Chu Zhao, Vol. 22, No. 3, 2020, pp. 486-491
Article Full Text PDF

15. Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture
Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang, Vol. 22, No. 3, 2020, pp. 492-503
Article Full Text PDF

16. Efficient Group Signature Scheme without Pairings
Ke Gu, Dianxing Liu, and Bo~Yin, Vol. 22, No. 3, 2020, pp. 504-515
Article Full Text PDF

17. Internet of Things: A Secure Cloud-based MANET Mobility Model
Tanweer Alam, Vol. 22, No. 3, 2020, pp. 516-522
Article Full Text PDF

18. Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem
He-Feng Chen, Chin-Chen Chang, and Kai-Meng Chen, Vol. 22, No. 3, 2020, pp. 523-533
Article Full Text PDF

19. Application of Novel Gabor-DCNN into RGB-D Face Recognition
Yuanyuan Xiao and Xiaoyao Xie, Vol. 22, No. 3, 2020, pp. 534-541
Article Full Text PDF

20. Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network
Munawar Hussain, Jiadong Ren, and Awais Akram, Vol. 22, No. 3, 2020, pp. 542-549
Article Full Text PDF