Quick Search:

Online First:

International Journal of Network Security

1. A New Diffusion and Substitution-Based Cryptosystem for Securing Medical Image Applications
L. Mancy and S. Maria Celestin Vigila
Article Full Text PDF

2. Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace
Budi Gunawan and Barito Mulyo Ratmono
Article Full Text PDF

3. FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks
You-Jian Yu, Guang-Fu Wang, and Jie Zhao
Article Full Text PDF

4. A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information
Ying-Chih Tseng and Heng Ma
Article Full Text PDF

5. Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone
Hui Xia and Weiji Yang
Article Full Text PDF

6. A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks
Keke Wu, Bo Peng, Hua Xie, and Shaobin Zhan
Article Full Text PDF

7. Joint Source-Relay Selection Scheme for Cooperative Networks under Eavesdropping Environment
Jianbin Xue, Heng Zhu, Xiaoming Liao, and Zhe Su
Article Full Text PDF

8. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
Shidong Zhang, Tongjiang Yan, Yuhua Sun, and Lianhai Wang
Article Full Text PDF

9. A Provably Secure Group Authentication Protocol for Various LTE Networks
Boriphat Kijjabuncha and Pipat Hiranvanichakorn
Article Full Text PDF

10. Probabilistic RSA with Homomorphism and Its Applications
Yaling Geng, Shundong Li, and Sufang Zhou
Article Full Text PDF

11. Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks
N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah
Article Full Text PDF

12. Attribute Based Encryption with Efficient Revocation from Lattices
Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu
Article Full Text PDF

13. Quadrivium: A Trivium-Inspired Pseudorandom Number Generator
Latoya Jackson and Yesem Kurt Peker
Article Full Text PDF

14. Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
Cossi Blaise Avoussoukpo, Chunxiang Xu, and Marius Tchenagnon
Article Full Text PDF

15. Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images
Xiaofeng Chen and Wenlong Guo
Article Full Text PDF

16. URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks
Putra Wanda and Huang Jin Jie
Article Full Text PDF

17. Correlation Functions of m-Sequences of Different Lengths
Zepeng Zhuo, Jinfeng Chong, and Lei Yu
Article Full Text PDF

18. Cryptanalysis of An Improved Predicate Encryption Scheme from LWE
Chengbo Xu
Article Full Text PDF

19. An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain
Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, and Yang Sun
Article Full Text PDF

20. Secure High Capacity Data Hiding Scheme based on Reference Matrix
Xiao-Shuang Li, Chin-Chen Chang, Ming-Xing He, and Chia-Chen Lin
Article Full Text PDF

21. An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm
Rui-Hong Dong, Hou-Hua Yan, and Qiu-Yu Zhang
Article Full Text PDF

22. Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing
Emmanuel Mugabo and Qiu-Yu Zhang
Article Full Text PDF

23. A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis
Yang Chen and Yonghong Chen
Article Full Text PDF

24. Identity Based Key-Insulated Encryption with Outsourced Equality Test
Seth Alornyo, Yanan Zhao, Guobin Zhu, and Hu Xiong
Article Full Text PDF

25. A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics
Yong-Bing Zhang, Qiu-Yu Zhang, Zong-Yi Li, Yan Yan, and Mo-Yi Zhang
Article Full Text PDF

26. Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group
Chu Zhao, Shoulin Yin, Hang Li, and Yang Sun
Article Full Text PDF

27. Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing
Wei-Liang Tai, Ya-Fen Chang, and Wen-Hsin Huang
Article Full Text PDF

28. Run-based Modular Reduction Method
Zhengjun Cao, Zhen Chen, Ruizhong Wei, and Lihua Liu
Article Full Text PDF

29. Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
Wei-Liang Tai, Ya-Fen Chang, and Po-Lin Hou
Article Full Text PDF

30. Anomaly Detection for Network Flow Using Immune Network and Density Peak
Yuanquan Shi and Hong Shen
Article Full Text PDF

31. Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
Peng-Shou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guo-qiang Ma, and Xue-Ming Han
Article Full Text PDF

32. Role Mining Algorithms Satisfied the Permission Cardinality Constraint
Jingyu Wang, Jingnan Dong, and Yuesheng Tan
Article Full Text PDF

33. Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage
Qianlong Dang, Hua Ma, Zhenhua Liu, and Ying Xie
Article Full Text PDF

34. Privacy-preserving Computational Geometry
Qiong Wei, Shundong Li, Wenli Wang, and Yanjing Yang
Article Full Text PDF

35. Packet Watermarking With ECG Biological Feature
KKuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, and Xiangmin Guo
Article Full Text PDF

36. Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell
Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, and Yu-Chen Hu
Article Full Text PDF

37. Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing
Hua Ma, Guo-Hua Tian, and Lin-Chao Zhang
Article Full Text PDF

38. A Note On One Secure Data Self-Destructing Scheme In Cloud Computing
Lihua Liu, Yang Li, Zhengjun Cao, and Zhen Chen
Article Full Text PDF

39. Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model
Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, and Bo Meng
Article Full Text PDF

40. Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce
Jia-Qi Wang, Yun-Feng Zhang, and Dao-Wei Liu
Article Full Text PDF

41. Certificateless Ring Signcryption Scheme from Pairings
Hui Guo and Lunzhi Deng
Article Full Text PDF

42. Efficient Near-Duplicate Document Detection Using Consistent Weighted Sampling Filter
Xinpan Yuan, Songlin Wang, Cheng Peng, and Chengyuan Zhang
Article Full Text PDF

43. A Formal Framework of Shielding Systems by Stepwise Refinement
Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, and Yan Xiong
Article Full Text PDF

44. StegoNote: Steganography in Guitar Music Using Note Modulation
Hui Tian, Zhaohua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, and Yiqiao Cai
Article Full Text PDF

45. A Modified Advanced Encryption Standard for Data Security
Lin Teng, Hang Li, Shoulin Yin, and Yang Sun
Article Full Text PDF

46. A PSO-based Wavelet-core ELM for Abnormal Flow Detection
Yueyang Su, Jing Wan, and Junkai Yi
Article Full Text PDF

47. A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding
Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, and Yanjun Liu
Article Full Text PDF

48. Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications
Jianmeng Huang, Wenchao Huang, Fuyou Miao, and Yan Xiong
Article Full Text PDF

49. On the Security of a Practical Constant-Size Ring Signature Scheme
Jianhong Zhang, Wenle Bai, and Zhengtao Jiang
Article Full Text PDF

50. Static Analysis of Superfluous Network Transmissions in Android Applications
Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, and Yan Xiong
Article Full Text PDF

51. One-Code-Pass User Authentication Based on QR Code and Secret Sharing
Yanjun Liu, Chin-Chen Chang, and Peng-Cheng Huang
Article Full Text PDF

52. Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption
Shoulin Yin, Jie Liu, and Lin Teng
Article Full Text PDF

53. A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
Xu Zhao, Guangqiu Huang, and Reza Mousoli
Article Full Text PDF

54. Android Malware Detection Approaches in Combination with Static and Dynamic Features
Ming-Yang Su, Jer-Yuan Chang, and Kek-Tung Fung
Article Full Text PDF

55. Malware Traffic Classification Based on Recurrence Quantification Analysis
Zheng-Zhi Tang, Xue-Wen Zeng, Zhi-Chuan Guo, and Man-Gu Song
Article Full Text PDF

56. Efficient Group Signature Scheme without Pairings
Ke Gu, Dianxing Liu, and Bo~Yin
Article Full Text PDF

57. Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m)
Shuang-Gen Liu, Shi-Mei Lu, and Rui-Wen Gong
Article Full Text PDF

58. Multi-Parameter and Time Series Based Trust for IoT Smart Sensors
Zhi-Ge He
Article Full Text PDF

59. Research on Cloud Service Security Measurement Based on Information Entropy
Tilei Gao, Tong Li, Rong Jiang, Ming Yang, and Rui Zhu
Article Full Text PDF

60. A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks
Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He and Chengyue Chang
Article Full Text PDF

61. Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems
Jing Bi, Shoulin Yin, Hang Li, Lin Teng, and Chu Zhao
Article Full Text PDF

62. A Novel Identity-based Authentication Scheme for IoV Security
Changguang Wang, Zimeng Dai, Dongmei Zhao, and Fangwei Wang
Article Full Text PDF

63. The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks
Shahrzad Sedaghat
Article Full Text PDF

64. Anonymous Transaction of Digital Currency Based on Blockchain
Yang Liu, Mingxing He, and Fangyuan Pu
Article Full Text PDF

65. Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture
Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang
Article Full Text PDF

66. Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System
Cai-Xue Zhou
Article Full Text PDF

67. LinkedIn Social Media Forensics on Windows 10
Ming-Sang Chang and Chih-Ping Yen
Article Full Text PDF

68. A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security
Fuxiao Zhou, Yanping Li, and Changlu Lin
Article Full Text PDF

69. A Note on One Popular Non-Interactive Zero-Knowledge Proof System
Zhengjun Cao, Xiqi Wang, and Lihua Liu
Article Full Text PDF

70. An Efficient Mobile Location-based Service Framework for Resource-constrained Devices
Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, and Dong Zheng
Article Full Text PDF