Quick Search:

Paper Preview:

International Journal of Network Security

1. An Identity Based Proxy Signcryption Scheme without Pairings
Hui Guo and Lunzhi Deng
Article Full Text PDF

2. Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols
Qingfeng Cheng, Yuting Li, Qi Jiang, and Xiong Li
Article Full Text PDF

3. A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}
Xiaolin Chen, Zhixiong Chen, and Huaning Liu
Article Full Text PDF

4. Extension of PCL Theory and Its Application in Improved CCITT X.509 Analysis
Lei Yu, Zhi-Yao Yang, and Ze-Peng Zhuo
Article Full Text PDF

5. A BLS Signature Scheme from Multilinear Maps
Fei Tang and Dong Huang
Article Full Text PDF

6. Partitioned Group Password-based Authenticated Key Exchange with Privacy Protection
Hongfeng Zhu, Yuanle Zhang, Xueying Wang, and Liwei Wang
Article Full Text PDF

7. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
Dan Zhu, Liwei Wang, and Hongfeng Zhu
Article Full Text PDF

8. Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm
Yanpeng Cui, Zichuan Jin, and Jianwei Hu
Article Full Text PDF

9. Detect Fast-Flux Domain Name with DGA through IP Fluctuation
Hongling Jiang and Jinzhi Lin
Article Full Text PDF

10. An Electronic Voting Scheme Based on LUC Secret System and Secret Sharing
Hongquan Pu, Zhe Cui, Ting Liu, Zhihan Wu, and Hongjiang Du
Article Full Text PDF

11. A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval
Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim
Article Full Text PDF

12. An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks
Alain Bertrand Bomgni and Garrik Brel Jagho Mdemaya
Article Full Text PDF

13. An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing
Ze Wang, Minghua Gao, Lu Chen, and Shimin Sun
Article Full Text PDF

14. A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, and Pabel Miah
Article Full Text PDF

15. Binary Executable Files Homology Detection with Genetic Algorithm
Jinyue Bian and Quan Qian
Article Full Text PDF

16. Eighth Power Residue Double Circulant Self-Dual Codes
Changsong Jiang, Yuhua Sun, and Xueting Liang
Article Full Text PDF

17. Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing
Seth Alornyo, Acheampong Edward Mensah, and Abraham Opanfo Abbam
Article Full Text PDF

18. Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience
Xiaoxu Gao and Leyou Zhang
Article Full Text PDF

19. A Distributed Density-based Outlier Detection Algorithm on Big Data
Lin Mei and Fengli Zhang
Article Full Text PDF

20. A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation
Shanshan Zhang
Article Full Text PDF

21. Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique
Haiou Yang and Youliang Tian
Article Full Text PDF

22. A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme
Li Kang and Leyou Zhang
Article Full Text PDF

23. Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System
Zhenhua Liu, Yan Liu, Jing Xu, and Baocang Wang
Article Full Text PDF

24. An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution
Bin Wang
Article Full Text PDF

25. A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks
ChenCheng Hu, Dong Zheng, Rui Guo, AXin Wu, Liang Wang, and ShiYao Gao
Article Full Text PDF

26. New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage
Changsong Yang, Xiaoling Tao, and Qiyu Chen
Article Full Text PDF

27. Constructions of Balanced Quaternary Sequences of Even Length
Jinfeng Chong and Zepeng Zhuo
Article Full Text PDF

28. A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks
Liang Wang, Dong Zheng, Rui Guo, ChenCheng Hu, and ChunMing Jing
Article Full Text PDF

29. Anti-SPA Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
Shuang-Gen Liu, Xin Heng, and Yuan-Meng Li
Article Full Text PDF

30. Analysis of One Fully Homomorphic Encryption Scheme in Client-Server Computing Scenario
Yang Li and Lihua Liu
Article Full Text PDF

31. Fine-grained Identification for SSL/TLS Packets
Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang
Article Full Text PDF

32. A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service
Baoyuan Kang, Jianqi Du, Yanbao Han, and Kun Qian
Article Full Text PDF

33. Multi-format Speech Perception Hashing Algorithm Based on Short-Time Logarithmic Energy and Improved Mel Energy Parameter Fusion
Yi-Bo Huang, Yong Wang, Qiu-Yu Zhang, and He-Xiang Hou
Article Full Text PDF

34. ECID: Elliptic Curve Identity-based Blind Signature Scheme
Shoulin Yin, Hang Li, Shahid Karim, and Yang Sun
Article Full Text PDF

35. A Sensitive-Information Hiding Treatment in Quick-Response Codes Based on Error-Correcting Framework
Mingwu Zhang, Xiao Chen, Yong Ding, and Hua Shen
Article Full Text PDF

36. Adaptive Fine-grained Access Control Method in Social Internet of Things
Hongbin Zhang, Pengcheng Ma, and Bin Liu
Article Full Text PDF

37. Information Aggregation Method of Intuitionistic Fuzzy Set Pair Analysis in Multi-Attribute Privacy Risk Decision-Making
Yan Yan, Bingqian Wang, Lianxiu Zhang, and Xin Gao
Article Full Text PDF

38. Experimental Study on the Influence of Satellite Spoofing on Power Timing Synchronization
Jianwu Zhang, Xinyu Luo, Xingbing Fu, Xuxu Wang, Chunsheng Guo, and Yanan Bai
Article Full Text PDF

39. Additively Homomorphic IBE with Auxiliary Input for Big Data Security
Zhiwei Wang, Congcong Zhu, Nianhua Yang, and Zhanlin Wang
Article Full Text PDF

40. A Lightweight User Authentication Scheme Based on Fuzzy Extraction Technology for Wireless Sensor Networks
Rui-Hong Dong, Bu-Bu Ren, Qiu-Yu Zhang, and Hui Yuan
Article Full Text PDF

41. An Identity Authentication Scheme of Energy Internet Based on Blockchain
Xiuxia Tian, Xi Chen, and Siqian Li
Article Full Text PDF

42. A k-Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution
Yong-Bing Zhang, Qiu-Yu Zhang, Yan Yan, Yi-Long Jiang, and Mo-Yi Zhang
Article Full Text PDF

43. Enhanced Deduplication Protocol for Side Channel in Cloud Storages
Jie Ouyang, Huiran Zhang, Hongqing Hu, Xiao Wei, and Dongbo Dai
Article Full Text PDF

44. Security Bound of Biclique Attacks on AES-128
Xiaoli Dong and Jie Che
Article Full Text PDF

45. Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts
Changchun Yan, Guoyou Zhang, Anhong Wang, Li Liu, and Chin-Chen Chang
Article Full Text PDF

46. A Differentially Private K-means Clustering Scheme for Smart Grid
Shuai Guo, Mi Wen, and Xiaohui Liang
Article Full Text PDF

47. Detection and Prevention of Jellyfish Attacks Using kNN Algorithm and Trusted Routing Scheme in MANET
Zulfiqar Ali Zardari, Jingsha He, Muhammad Salman Pathan, Sirajuddin Qureshi, Muhammad Iftikhar Hussain, Fahad Razaque, Peng He, and Nafei Zhu
Article Full Text PDF

48. Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles
Peng-Shou Xie, Guo-Qiang Ma, Tao Feng, Yan Yan, and Xue-Ming Han
Article Full Text PDF

49. Personalized K-In&Out-Degree Anonymity Method for Large-scale Social Networks Based on Hierarchical Community Structure
XiaoLin Zhang, Jiao Liu, HongJing Bi, Jian Li, and YongPing Wang
Article Full Text PDF

50. Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening
Chengkai Yang, Zhihong Li, Wenxia Cai, Shaowei Weng, Li Liu, and Anhong Wang
Article Full Text PDF

51. IIntrusion Detection Method Based on MapReduce for Evolutionary Feature Selection in Mobile Cloud Computing
Emmanuel Mugabo, Qiu-Yu Zhang, Aristide Ngaboyindekwe, Vincent de Paul Niyigena Kwizera, and Victus Elikplim Lumorvie
Article Full Text PDF

52. A P2P Anonymous Communication Scheme in IOT Based on Blockchain
Ye Lu
Article Full Text PDF

53. A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence
Shoulin Yin, Jie Liu, and Lin Teng
Article Full Text PDF

54. An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix
Jiang-Yi Lin, Yu Chen,Chin-Chen Chang, and Yu-Chen Hu
Article Full Text PDF

55. Secure Sharing of Data for Dynamic Group in Public Cloud
Cungang Yang and Celia Li
Article Full Text PDF

56. Evidence Gathering of Facebook Messenger on Android
Ming-Sang Chang and Chih-Ping Yen
Article Full Text PDF