Quick Search:

Online First:

International Journal of Network Security

1. A New Diffusion and Substitution-Based Cryptosystem for Securing Medical Image Applications
L. Mancy and S. Maria Celestin Vigila
Article Full Text PDF

2. Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace
Budi Gunawan and Barito Mulyo Ratmono
Article Full Text PDF

3. FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks
You-Jian Yu, Guang-Fu Wang, and Jie Zhao
Article Full Text PDF

4. A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information
Ying-Chih Tseng and Heng Ma
Article Full Text PDF

5. Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone
Hui Xia and Weiji Yang
Article Full Text PDF

6. A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks
Keke Wu, Bo Peng, Hua Xie, and Shaobin Zhan
Article Full Text PDF

7. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
Shidong Zhang, Tongjiang Yan, Yuhua Sun, and Lianhai Wang
Article Full Text PDF

8. Attribute Based Encryption with Efficient Revocation from Lattices
Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu
Article Full Text PDF

9. Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
Cossi Blaise Avoussoukpo, Chunxiang Xu, and Marius Tchenagnon
Article Full Text PDF

10. Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images
Xiaofeng Chen and Wenlong Guo
Article Full Text PDF

11. Correlation Functions of m-Sequences of Different Lengths
Zepeng Zhuo, Jinfeng Chong, and Lei Yu
Article Full Text PDF

12. An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain
Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, and Yang Sun
Article Full Text PDF

13. An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm
Rui-Hong Dong, Hou-Hua Yan, and Qiu-Yu Zhang
Article Full Text PDF

14. Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing
Emmanuel Mugabo and Qiu-Yu Zhang
Article Full Text PDF

15. A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis
Yang Chen and Yonghong Chen
Article Full Text PDF

16. Identity Based Key-Insulated Encryption with Outsourced Equality Test
Seth Alornyo, Yanan Zhao, Guobin Zhu, and Hu Xiong
Article Full Text PDF

17. Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group
Chu Zhao, Shoulin Yin, Hang Li, and Yang Sun
Article Full Text PDF

18. Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing
Wei-Liang Tai, Ya-Fen Chang, and Wen-Hsin Huang
Article Full Text PDF

19. Run-based Modular Reduction Method
Zhengjun Cao, Zhen Chen, Ruizhong Wei, and Lihua Liu
Article Full Text PDF

20. Anomaly Detection for Network Flow Using Immune Network and Density Peak
Yuanquan Shi and Hong Shen
Article Full Text PDF

21. Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
Peng-Shou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guo-qiang Ma, and Xue-Ming Han
Article Full Text PDF

22. Role Mining Algorithms Satisfied the Permission Cardinality Constraint
Jingyu Wang, Jingnan Dong, and Yuesheng Tan
Article Full Text PDF

23. Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage
Qianlong Dang, Hua Ma, Zhenhua Liu, and Ying Xie
Article Full Text PDF

24. Packet Watermarking With ECG Biological Feature
KKuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, and Xiangmin Guo
Article Full Text PDF

25. Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell
Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, and Yu-Chen Hu
Article Full Text PDF

26. Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing
Hua Ma, Guo-Hua Tian, and Lin-Chao Zhang
Article Full Text PDF

27. A Note On One Secure Data Self-Destructing Scheme In Cloud Computing
Lihua Liu, Yang Li, Zhengjun Cao, and Zhen Chen
Article Full Text PDF

28. Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model
Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, and Bo Meng
Article Full Text PDF

29. Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce
Jia-Qi Wang, Yun-Feng Zhang, and Dao-Wei Liu
Article Full Text PDF

30. Certificateless Ring Signcryption Scheme from Pairings
Hui Guo and Lunzhi Deng
Article Full Text PDF

31. A Formal Framework of Shielding Systems by Stepwise Refinement
Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, and Yan Xiong
Article Full Text PDF

32. StegoNote: Steganography in Guitar Music Using Note Modulation
Hui Tian, Zhaohua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, and Yiqiao Cai
Article Full Text PDF

33. A Modified Advanced Encryption Standard for Data Security
Lin Teng, Hang Li, Shoulin Yin, and Yang Sun
Article Full Text PDF

34. A PSO-based Wavelet-core ELM for Abnormal Flow Detection
Yueyang Su, Jing Wan, and Junkai Yi
Article Full Text PDF

35. A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding
Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, and Yanjun Liu
Article Full Text PDF

36. Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications
Jianmeng Huang, Wenchao Huang, Fuyou Miao, and Yan Xiong
Article Full Text PDF

37. On the Security of a Practical Constant-Size Ring Signature Scheme
Jianhong Zhang, Wenle Bai, and Zhengtao Jiang
Article Full Text PDF

38. Static Analysis of Superfluous Network Transmissions in Android Applications
Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, and Yan Xiong
Article Full Text PDF

39. One-Code-Pass User Authentication Based on QR Code and Secret Sharing
Yanjun Liu, Chin-Chen Chang, and Peng-Cheng Huang
Article Full Text PDF

40. Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption
Shoulin Yin, Jie Liu, and Lin Teng
Article Full Text PDF

41. A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
Xu Zhao, Guangqiu Huang, and Reza Mousoli
Article Full Text PDF

42. Malware Traffic Classification Based on Recurrence Quantification Analysis
Zheng-Zhi Tang, Xue-Wen Zeng, Zhi-Chuan Guo, and Man-Gu Song
Article Full Text PDF

43. Efficient Group Signature Scheme without Pairings
Ke Gu, Dianxing Liu, and Bo~Yin
Article Full Text PDF

44. Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m)
Shuang-Gen Liu, Shi-Mei Lu, and Rui-Wen Gong
Article Full Text PDF

45. Multi-Parameter and Time Series Based Trust for IoT Smart Sensors
Zhi-Ge He
Article Full Text PDF

46. Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems
Jing Bi, Shoulin Yin, Hang Li, Lin Teng, and Chu Zhao
Article Full Text PDF

47. A Novel Identity-based Authentication Scheme for IoV Security
Changguang Wang, Zimeng Dai, Dongmei Zhao, and Fangwei Wang
Article Full Text PDF

48. The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks
Shahrzad Sedaghat
Article Full Text PDF

49. Anonymous Transaction of Digital Currency Based on Blockchain
Yang Liu, Mingxing He, and Fangyuan Pu
Article Full Text PDF

50. Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture
Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang
Article Full Text PDF

51. Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System
Cai-Xue Zhou
Article Full Text PDF

52. LinkedIn Social Media Forensics on Windows 10
Ming-Sang Chang and Chih-Ping Yen
Article Full Text PDF

53. A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security
Fuxiao Zhou, Yanping Li, and Changlu Lin
Article Full Text PDF

54. A Note on One Popular Non-Interactive Zero-Knowledge Proof System
Zhengjun Cao, Xiqi Wang, and Lihua Liu
Article Full Text PDF

55. An Efficient Mobile Location-based Service Framework for Resource-constrained Devices
Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, and Dong Zheng
Article Full Text PDF

56. Tripartite Authentication Protocol RFID/NFC Based on ECC
Yongshuang Wei and Jianhua Chen
Article Full Text PDF

57. Application of Novel Gabor-DCNN into RGB-D Face Recognition
Yuanyuan Xiao and Xiaoyao Xie
Article Full Text PDF

58. A Perceptual Hash-based Approach to Detect Covert Timing Channels
Linfan Wang and Yonghong Chen
Article Full Text PDF

59. An Multi-step Attack Prediction Method Based on Probabilistic Reasoning Model
Guangming Tang, Shuo Wang, Guang Kou, Yuan Bian, Wenfeng Kang
Article Full Text PDF