| International Journal of Network Security | ||
| 1. | Sharing a Secret Image in the Cloud Using Two Shadows
|
|
| Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu, Vol. 22, No. 4, 2020, pp. 551-560 Article Full Text PDF |
||
| 2. | An Identity Based Proxy Signcryption Scheme without Pairings
|
|
| Hui Guo and Lunzhi Deng, Vol. 22, No. 4, 2020, pp. 561-568 Article Full Text PDF |
||
| 3. | Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m)
|
|
| Shuang-Gen Liu, Shi-Mei Lu, and Rui-Wen Gong, Vol. 22, No. 4, 2020, pp. 569-574 Article Full Text PDF |
||
| 4. | A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding
|
|
| Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, and Yanjun Liu, Vol. 22, No. 4, 2020, pp. 575-583 Article Full Text PDF |
||
| 5. | Security Analysis of a Certicateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System
|
|
| Cai-Xue Zhou, Vol. 22, No. 4, 2020, pp. 584-588 Article Full Text PDF |
||
| 6. | Multi-Parameter and Time Series Based Trust for IoT Smart Sensors
|
|
| Zhi-Ge He, Vol. 22, No. 4, 2020, pp. 589-596 Article Full Text PDF |
||
| 7. | Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols
|
|
| Qingfeng Cheng, Yuting Li, Qi Jiang, and Xiong Li, Vol. 22, No. 4, 2020, pp. 597-601 Article Full Text PDF |
||
| 8. | An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks
|
|
| Alain Bertrand Bomgni and Garrik Brel Jagho Mdemaya, Vol. 22, No. 4, 2020, pp. 602-609 Article Full Text PDF |
||
| 9. | A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}
|
|
| Xiaolin Chen, Zhixiong Chen, and Huaning Liu, Vol. 22, No. 4, 2020, pp. 610-620 Article Full Text PDF |
||
| 10. | Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography
|
|
| Tianhong Yang, Vol. 22, No. 4, 2020, pp. 621-626 Article Full Text PDF |
||
| 11. | A Novel Identity-based Authentication Scheme for IoV Security
|
|
| Changguang Wang, Zimeng Dai, Dongmei Zhao, and Fangwei Wang, Vol. 22, No. 4, 2020, pp. 627-637 Article Full Text PDF |
||
| 12. | A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
|
|
| Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, and Pabel Miah, Vol. 22, No. 4, 2020, pp. 638-644 Article Full Text PDF |
||
| 13. | A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security
|
|
| Fuxiao Zhou, Yanping Li, and Changlu Lin, Vol. 22, No. 4, 2020, pp. 645-654 Article Full Text PDF |
||
| 14. | Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles
|
|
| Peng-Shou Xie, Guo-Qiang Ma, Tao Feng, Yan Yan, and Xue-Ming Han, Vol. 22, No. 4, 2020, pp. 655-663 Article Full Text PDF |
||
| 15. | Tripartite Authentication Protocol RFID/NFC Based on ECC
|
|
| Yongshuang Wei and Jianhua Chen, Vol. 22, No. 4, 2020, pp. 664-671 Article Full Text PDF |
||
| 16. | Secure Sharing of Data for Dynamic Group in Public Cloud
|
|
| Cungang Yang and Celia Li, Vol. 22, No. 4, 2020, pp. 672-680 Article Full Text PDF |
||
| 17. | A Note on One Popular Non-Interactive Zero-Knowledge Proof System
|
|
| Zhengjun Cao, Xiqi Wang, and Lihua Liu, Vol. 22, No. 4, 2020, pp. 681-685 Article Full Text PDF |
||
| 18. | A Perceptual Hash-based Approach to Detect Covert Timing Channels
|
|
| Linfan Wang and Yonghong Chen, Vol. 22, No. 4, 2020, pp. 686-697 Article Full Text PDF |
||
| 19. | An Efficient Mobile Location-based Service Framework for Resource-constrained Devices
|
|
| Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, and Dong Zheng, Vol. 22, No. 4, 2020, pp. 698-707 Article Full Text PDF |
||
| 20. | Research on the Secure Financial Surveillance Blockchain Systems
|
|
| Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 22, No. 4, 2020, pp. 708-716 Article Full Text PDF |
||