International Journal of Network Security | ||
1. | Sharing a Secret Image in the Cloud Using Two Shadows
|
|
Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu, Vol. 22, No. 4, 2020, pp. 551-560 Article Full Text PDF |
||
2. | An Identity Based Proxy Signcryption Scheme without Pairings
|
|
Hui Guo and Lunzhi Deng, Vol. 22, No. 4, 2020, pp. 561-568 Article Full Text PDF |
||
3. | Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m)
|
|
Shuang-Gen Liu, Shi-Mei Lu, and Rui-Wen Gong, Vol. 22, No. 4, 2020, pp. 569-574 Article Full Text PDF |
||
4. | A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding
|
|
Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, and Yanjun Liu, Vol. 22, No. 4, 2020, pp. 575-583 Article Full Text PDF |
||
5. | Security Analysis of a Certicateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System
|
|
Cai-Xue Zhou, Vol. 22, No. 4, 2020, pp. 584-588 Article Full Text PDF |
||
6. | Multi-Parameter and Time Series Based Trust for IoT Smart Sensors
|
|
Zhi-Ge He, Vol. 22, No. 4, 2020, pp. 589-596 Article Full Text PDF |
||
7. | Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols
|
|
Qingfeng Cheng, Yuting Li, Qi Jiang, and Xiong Li, Vol. 22, No. 4, 2020, pp. 597-601 Article Full Text PDF |
||
8. | An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks
|
|
Alain Bertrand Bomgni and Garrik Brel Jagho Mdemaya, Vol. 22, No. 4, 2020, pp. 602-609 Article Full Text PDF |
||
9. | A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}
|
|
Xiaolin Chen, Zhixiong Chen, and Huaning Liu, Vol. 22, No. 4, 2020, pp. 610-620 Article Full Text PDF |
||
10. | Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography
|
|
Tianhong Yang, Vol. 22, No. 4, 2020, pp. 621-626 Article Full Text PDF |
||
11. | A Novel Identity-based Authentication Scheme for IoV Security
|
|
Changguang Wang, Zimeng Dai, Dongmei Zhao, and Fangwei Wang, Vol. 22, No. 4, 2020, pp. 627-637 Article Full Text PDF |
||
12. | A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
|
|
Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, and Pabel Miah, Vol. 22, No. 4, 2020, pp. 638-644 Article Full Text PDF |
||
13. | A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security
|
|
Fuxiao Zhou, Yanping Li, and Changlu Lin, Vol. 22, No. 4, 2020, pp. 645-654 Article Full Text PDF |
||
14. | Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles
|
|
Peng-Shou Xie, Guo-Qiang Ma, Tao Feng, Yan Yan, and Xue-Ming Han, Vol. 22, No. 4, 2020, pp. 655-663 Article Full Text PDF |
||
15. | Tripartite Authentication Protocol RFID/NFC Based on ECC
|
|
Yongshuang Wei and Jianhua Chen, Vol. 22, No. 4, 2020, pp. 664-671 Article Full Text PDF |
||
16. | Secure Sharing of Data for Dynamic Group in Public Cloud
|
|
Cungang Yang and Celia Li, Vol. 22, No. 4, 2020, pp. 672-680 Article Full Text PDF |
||
17. | A Note on One Popular Non-Interactive Zero-Knowledge Proof System
|
|
Zhengjun Cao, Xiqi Wang, and Lihua Liu, Vol. 22, No. 4, 2020, pp. 681-685 Article Full Text PDF |
||
18. | A Perceptual Hash-based Approach to Detect Covert Timing Channels
|
|
Linfan Wang and Yonghong Chen, Vol. 22, No. 4, 2020, pp. 686-697 Article Full Text PDF |
||
19. | An Efficient Mobile Location-based Service Framework for Resource-constrained Devices
|
|
Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, and Dong Zheng, Vol. 22, No. 4, 2020, pp. 698-707 Article Full Text PDF |
||
20. | Research on the Secure Financial Surveillance Blockchain Systems
|
|
Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 22, No. 4, 2020, pp. 708-716 Article Full Text PDF |
||