Quick Search:

Paper Preview:

International Journal of Network Security

1. Research on Blockchain Technologies in Bidding Systems
Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, and Min-Shiang Hwang
Article Full Text PDF

2. A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval
Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim
Article Full Text PDF

3. Constructions of Balanced Quaternary Sequences of Even Length
Jinfeng Chong and Zepeng Zhuo
Article Full Text PDF

4. Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm
Yanpeng Cui, Zichuan Jin, and Jianwei Hu
Article Full Text PDF

5. Analyzing System Log Based on Machine Learning Model
Chia-Mei Chen, Gen-Hong Syu, and Zheng-Xun Cai
Article Full Text PDF

6. Efficient and Secure Outsourcing of Modular Exponentiation Based on Smart Contract
Danting Xu, Yanli Ren, Xiangyu Li, and Guorui Feng
Article Full Text PDF

7. A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service
Baoyuan Kang, Jianqi Du, Yanbao Han, and Kun Qian
Article Full Text PDF

8. Experimental Study on the Influence of Satellite Spoofing on Power Timing Synchronization
Jianwu Zhang, Xinyu Luo, Xingbing Fu, Xuxu Wang, Chunsheng Guo, and Yanan Bai
Article Full Text PDF

9. Some Further Results of Pseudorandom Binary Sequences Derived from the Discrete Logarithm in Finite Fields
Vladimir A Edemskiy, Zhixiong Chen, Sergey Garbar
Article Full Text PDF

10. Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening
Chengkai Yang, Zhihong Li, Wenxia Cai, Shaowei Weng, Li Liu, and Anhong Wang
Article Full Text PDF

11. Fine-grained Identification for SSL/TLS Packets
Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang
Article Full Text PDF

12. A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks
Liang Wang, Dong Zheng, Rui Guo, ChenCheng Hu, and ChunMing Jing
Article Full Text PDF

13. A Literature Survey of Visual Similarity Snooping Attacks in Emails
George Mwangi Muhindi, Georey MarigaWambugu, and Aaron Mogeni Oirere
Article Full Text PDF

14. Network Security Model for Multi-parallel Wireless Communication based on BMNS
Fengfei Kuang
Article Full Text PDF

15. Malicious Attack Detection Algorithm of Internet of Vehicles based on CW-KNN
Peng-Shou Xie, Cheng Fu, Tao Feng, Yan Yan, and Liang-Lu Li
Article Full Text PDF

16. Anti-SPA Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
Shuang-Gen Liu, Xin Heng, and Yuan-Meng Li
Article Full Text PDF

17. Classifying Malware Images with Convolutional Neural Network Models
Ahmed Bensaoud, Nawaf Abudawaood, and Jugal Kalita
Article Full Text PDF

18. Analysis of One Fully Homomorphic Encryption Scheme in Client-Server Computing Scenario
Yang Li and Lihua Liu
Article Full Text PDF

19. Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
Xuhua Zhao
Article Full Text PDF

20. Multi-format Speech Perception Hashing Algorithm Based on Short-Time Logarithmic Energy and Improved Mel Energy Parameter Fusion
Yi-Bo Huang, Yong Wang, Qiu-Yu Zhang, and He-Xiang Hou
Article Full Text PDF