International Journal of Network Security | ||
1. | Research on Malware Detection and Classification Based on Artificial Intelligence
|
|
Li-Chin Huang, Chun-Hsien Chang, and Min-Shiang Hwang, Vol. 22, No. 5, 2020, pp. 717-727 Article Full Text PDF |
||
2. | A BLS Signature Scheme from Multilinear Maps
|
|
Fei Tang and Dong Huang, Vol. 22, No. 5, 2020, pp. 728-735 Article Full Text PDF |
||
3. | Eighth Power Residue Double Circulant Self-Dual Codes
|
|
Changsong Jiang, Yuhua Sun, and Xueting Liang, Vol. 22, No. 5, 2020, pp. 736-742 Article Full Text PDF |
||
4. | Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing
|
|
Seth Alornyo, Acheampong Edward Mensah, and Abraham Opanfo Abbam, Vol. 22, No. 5, 2020, pp. 743-751 Article Full Text PDF |
||
5. | One-Code-Pass User Authentication Based on QR Code and Secret Sharing
|
|
Yanjun Liu, Chin-Chen Chang, and Peng-Cheng Huang, Vol. 22, No. 5, 2020, pp. 752-762 Article Full Text PDF |
||
6. | Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience
|
|
Xiaoxu Gao and Leyou Zhang, Vol. 22, No. 5, 2020, pp. 763-774 Article Full Text PDF |
||
7. | A Distributed Density-based Outlier Detection Algorithm on Big Data
|
|
Lin Mei and Fengli Zhang, Vol. 22, No. 5, 2020, pp. 775-781 Article Full Text PDF |
||
8. | Binary Executable Files Homology Detection with Genetic Algorithm
|
|
Jinyue Bian and Quan Qian, Vol. 22, No. 5, 2020, pp. 782-792 Article Full Text PDF |
||
9. | A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications
|
|
L. Mancy and S. Maria Celestin Vigila, Vol. 22, No. 5, 2020, pp. 793-800 Article Full Text PDF |
||
10. | A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation
|
|
Shanshan Zhang, Vol. 22, No. 5, 2020, pp. 801-808 Article Full Text PDF |
||
11. | Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique
|
|
Haiou Yang and Youliang Tian, Vol. 22, No. 5, 2020, pp. 809-814 Article Full Text PDF |
||
12. | A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme
|
|
Li Kang and Leyou Zhang, Vol. 22, No. 5, 2020, pp. 815-827 Article Full Text PDF |
||
13. | Evidence Gathering of Facebook Messenger on Android
|
|
Ming-Sang Chang and Chih-Ping Yen, Vol. 22, No. 5, 2020, pp. 828-837 Article Full Text PDF |
||
14. | Protection of User Data by Differential Privacy Algorithms
|
|
Jian Liu and Feilong Qin, Vol. 22, No. 5, 2020, pp. 838-844 Article Full Text PDF |
||
15. | Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System
|
|
Zhenhua Liu, Yan Liu, Jing Xu, and Baocang Wang, Vol. 22, No. 5, 2020, pp. 845-856 Article Full Text PDF |
||
16. | An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution
|
|
Bin Wang, Vol. 22, No. 5, 2020, pp. 857-862 Article Full Text PDF |
||
17. | Survey on Attribute-based Encryption in Cloud Computing
|
|
P. R. Ancy, Addapalli V. N. Krishna, K. Balachandran, M. Balamurugan, and O. S. Gnana Prakasi, Vol. 22, No. 5, 2020, pp. 863-868 Article Full Text PDF |
||
18. | A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence
|
|
Shoulin Yin, Jie Liu, and Lin Teng, Vol. 22, No. 5, 2020, pp. 869-873 Article Full Text PDF |
||
19. | A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks
|
|
ChenCheng Hu, Dong Zheng, Rui Guo, AXin Wu, Liang Wang, and ShiYao Gao, Vol. 22, No. 5, 2020, pp. 874-884 Article Full Text PDF |
||
20. | New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage
|
|
Changsong Yang, Xiaoling Tao, and Qiyu Chen, Vol. 22, No. 5, 2020, pp. 885-896 Article Full Text PDF |
||