Quick Search:

Volume: 22, No: 5 (September 1, 2020)

International Journal of Network Security

1. Research on Malware Detection and Classification Based on Artificial Intelligence
Li-Chin Huang, Chun-Hsien Chang, and Min-Shiang Hwang, Vol. 22, No. 5, 2020, pp. 717-727
Article Full Text PDF

2. A BLS Signature Scheme from Multilinear Maps
Fei Tang and Dong Huang, Vol. 22, No. 5, 2020, pp. 728-735
Article Full Text PDF

3. Eighth Power Residue Double Circulant Self-Dual Codes
Changsong Jiang, Yuhua Sun, and Xueting Liang, Vol. 22, No. 5, 2020, pp. 736-742
Article Full Text PDF

4. Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing
Seth Alornyo, Acheampong Edward Mensah, and Abraham Opanfo Abbam, Vol. 22, No. 5, 2020, pp. 743-751
Article Full Text PDF

5. One-Code-Pass User Authentication Based on QR Code and Secret Sharing
Yanjun Liu, Chin-Chen Chang, and Peng-Cheng Huang, Vol. 22, No. 5, 2020, pp. 752-762
Article Full Text PDF

6. Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience
Xiaoxu Gao and Leyou Zhang, Vol. 22, No. 5, 2020, pp. 763-774
Article Full Text PDF

7. A Distributed Density-based Outlier Detection Algorithm on Big Data
Lin Mei and Fengli Zhang, Vol. 22, No. 5, 2020, pp. 775-781
Article Full Text PDF

8. Binary Executable Files Homology Detection with Genetic Algorithm
Jinyue Bian and Quan Qian, Vol. 22, No. 5, 2020, pp. 782-792
Article Full Text PDF

9. A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications
L. Mancy and S. Maria Celestin Vigila, Vol. 22, No. 5, 2020, pp. 793-800
Article Full Text PDF

10. A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation
Shanshan Zhang, Vol. 22, No. 5, 2020, pp. 801-808
Article Full Text PDF

11. Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique
Haiou Yang and Youliang Tian, Vol. 22, No. 5, 2020, pp. 809-814
Article Full Text PDF

12. A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme
Li Kang and Leyou Zhang, Vol. 22, No. 5, 2020, pp. 815-827
Article Full Text PDF

13. Evidence Gathering of Facebook Messenger on Android
Ming-Sang Chang and Chih-Ping Yen, Vol. 22, No. 5, 2020, pp. 828-837
Article Full Text PDF

14. Protection of User Data by Differential Privacy Algorithms
Jian Liu and Feilong Qin, Vol. 22, No. 5, 2020, pp. 838-844
Article Full Text PDF

15. Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System
Zhenhua Liu, Yan Liu, Jing Xu, and Baocang Wang, Vol. 22, No. 5, 2020, pp. 845-856
Article Full Text PDF

16. An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution
Bin Wang, Vol. 22, No. 5, 2020, pp. 857-862
Article Full Text PDF

17. Survey on Attribute-based Encryption in Cloud Computing
P. R. Ancy, Addapalli V. N. Krishna, K. Balachandran, M. Balamurugan, and O. S. Gnana Prakasi, Vol. 22, No. 5, 2020, pp. 863-868
Article Full Text PDF

18. A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence
Shoulin Yin, Jie Liu, and Lin Teng, Vol. 22, No. 5, 2020, pp. 869-873
Article Full Text PDF

19. A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks
ChenCheng Hu, Dong Zheng, Rui Guo, AXin Wu, Liang Wang, and ShiYao Gao, Vol. 22, No. 5, 2020, pp. 874-884
Article Full Text PDF

20. New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage
Changsong Yang, Xiaoling Tao, and Qiyu Chen, Vol. 22, No. 5, 2020, pp. 885-896
Article Full Text PDF