Quick Search:

Volume: 22, No: 3 (March 1, 2020)

International Journal of Network Security

1. Role Mining Algorithms Satisfied the Permission Cardinality Constraint
Jingyu Wang, Jingnan Dong, and Yuesheng Tan, Vol. 22, No. 3, 2020, pp. 371-380
Article Full Text PDF

2. Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications
Jianmeng Huang, Wenchao Huang, Fuyou Miao, and Yan Xiong, Vol. 22, No. 3, 2020, pp. 381-391
Article Full Text PDF

3. On the Security of a Practical Constant-Size Ring Signature Scheme
Jianhong Zhang, Wenle Bai, and Zhengtao Jiang, Vol. 22, No. 3, 2020, pp. 392-396
Article Full Text PDF

4. Timestamp Based Detection of Sybil Attack in VANET
Syed Mohd Faisal and Taskeen Zaidi, Vol. 22, No. 3, 2020, pp. 397-408
Article Full Text PDF

5. Static Analysis of Superfluous Network Transmissions in Android Applications
Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, and Yan Xiong, Vol. 22, No. 3, 2020, pp. 409-418
Article Full Text PDF

6. Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption
Shoulin Yin, Jie Liu, and Lin Teng, Vol. 22, No. 3, 2020, pp. 419-424
Article Full Text PDF

7. A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
Xu Zhao, Guangqiu Huang, and Reza Mousoli, Vol. 22, No. 3, 2020, pp. 425-434
Article Full Text PDF

8. A Novel Approach for Component based Application Logic Event Attack Modeling
Faisal Nabi, Jianming Yong, and Xiaohui Tao, Vol. 22, No. 3, 2020, pp. 435-441
Article Full Text PDF

9. Anonymous Transaction of Digital Currency Based on Blockchain
Yang Liu, Mingxing He, and Fangyuan Pu, Vol. 22, No. 3, 2020, pp. 442-448
Article Full Text PDF

10. Malware Traffic Classification Based on Recurrence Quantification Analysis
Zheng-Zhi Tang, Xue-Wen Zeng, Zhi-Chuan Guo, and Man-Gu Song, Vol. 22, No. 3, 2020, pp. 449-459
Article Full Text PDF

11. Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage
Qianlong Dang, Hua Ma, Zhenhua Liu, and Ying Xie, Vol. 22, No. 3, 2020, pp. 460-473
Article Full Text PDF

12. Design of Key Management Protocols for Internet of Things
Cungang Yang and Celia Li, Vol. 22, No. 3, 2020, pp. 474-483
Article Full Text PDF

13. Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems
Jing Bi, Shoulin Yin, Hang Li, Lin Teng, and Chu Zhao, Vol. 22, No. 3, 2020, pp. 484-489
Article Full Text PDF

14. Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture
Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang, Vol. 22, No. 3, 2020, pp. 490-501
Article Full Text PDF

15. Efficient Group Signature Scheme without Pairings
Ke Gu, Dianxing Liu, and Bo~Yin, Vol. 22, No. 3, 2020, pp. 502-513
Article Full Text PDF

16. Internet of Things: A Secure Cloud-based MANET Mobility Model
Tanweer Alam, Vol. 22, No. 3, 2020, pp. 514-520
Article Full Text PDF

17. Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem
He-Feng Chen, Chin-Chen Chang, and Kai-Meng Chen, Vol. 22, No. 3, 2020, pp. 521-531
Article Full Text PDF

18. Application of Novel Gabor-DCNN into RGB-D Face Recognition
Yuanyuan Xiao and Xiaoyao Xie, Vol. 22, No. 3, 2020, pp. 532-539
Article Full Text PDF

19. Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network
Munawar Hussain, Jiadong Ren, and Awais Akram, Vol. 22, No. 3, 2020, pp. 540-547
Article Full Text PDF

20. Subject index to volume 22 (2020)
Article Full Text PDF

21. Author index to volume 22 (2020)
Article Full Text PDF

22. Reviewer index to volume 22 (2020)
Article Full Text PDF

23. All Papers to volume 22 (2020)
Article Full Text PDF