Quick Search:

Volume: 22, No: 4 (July 1, 2020)

International Journal of Network Security

1. Sharing a Secret Image in the Cloud Using Two Shadows
Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu, Vol. 22, No. 4, 2020, pp. 551-560
Article Full Text PDF

2. An Identity Based Proxy Signcryption Scheme without Pairings
Hui Guo and Lunzhi Deng, Vol. 22, No. 4, 2020, pp. 561-568
Article Full Text PDF

3. Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m)
Shuang-Gen Liu, Shi-Mei Lu, and Rui-Wen Gong, Vol. 22, No. 4, 2020, pp. 569-574
Article Full Text PDF

4. A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding
Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, and Yanjun Liu, Vol. 22, No. 4, 2020, pp. 575-583
Article Full Text PDF

5. Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System
Cai-Xue Zhou, Vol. 22, No. 4, 2020, pp. 584-588
Article Full Text PDF

6. Multi-Parameter and Time Series Based Trust for IoT Smart Sensors
Zhi-Ge He, Vol. 22, No. 4, 2020, pp. 589-596
Article Full Text PDF

7. Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols
Qingfeng Cheng, Yuting Li, Qi Jiang, and Xiong Li, Vol. 22, No. 4, 2020, pp. 597-601
Article Full Text PDF

8. An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks
Alain Bertrand Bomgni and Garrik Brel Jagho Mdemaya, Vol. 22, No. 4, 2020, pp. 602-609
Article Full Text PDF

9. A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}
Xiaolin Chen, Zhixiong Chen, and Huaning Liu, Vol. 22, No. 4, 2020, pp. 610-620
Article Full Text PDF

10. Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography
Tianhong Yang, Vol. 22, No. 4, 2020, pp. 621-626
Article Full Text PDF

11. A Novel Identity-based Authentication Scheme for IoV Security
Changguang Wang, Zimeng Dai, Dongmei Zhao, and Fangwei Wang, Vol. 22, No. 4, 2020, pp. 627-637
Article Full Text PDF

12. A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, and Pabel Miah, Vol. 22, No. 4, 2020, pp. 638-644
Article Full Text PDF

13. A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security
Fuxiao Zhou, Yanping Li, and Changlu Lin, Vol. 22, No. 4, 2020, pp. 645-654
Article Full Text PDF

14. Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles
Peng-Shou Xie, Guo-Qiang Ma, Tao Feng, Yan Yan, and Xue-Ming Han, Vol. 22, No. 4, 2020, pp. 655-663
Article Full Text PDF

15. Tripartite Authentication Protocol RFID/NFC Based on ECC
Yongshuang Wei and Jianhua Chen, Vol. 22, No. 4, 2020, pp. 664-671
Article Full Text PDF

16. Secure Sharing of Data for Dynamic Group in Public Cloud
Cungang Yang and Celia Li, Vol. 22, No. 4, 2020, pp. 672-680
Article Full Text PDF

17. A Note on One Popular Non-Interactive Zero-Knowledge Proof System
Zhengjun Cao, Xiqi Wang, and Lihua Liu, Vol. 22, No. 4, 2020, pp. 681-685
Article Full Text PDF

18. A Perceptual Hash-based Approach to Detect Covert Timing Channels
Linfan Wang and Yonghong Chen, Vol. 22, No. 4, 2020, pp. 686-697
Article Full Text PDF

19. An Efficient Mobile Location-based Service Framework for Resource-constrained Devices
Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, and Dong Zheng, Vol. 22, No. 4, 2020, pp. 698-707
Article Full Text PDF

20. Research on the Secure Financial Surveillance Blockchain Systems
Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 22, No. 4, 2020, pp. 708-716
Article Full Text PDF