International Journal of Network Security  
1.  Research on Blockchain Technologies in Bidding Systems


YiHui Chen, LiChin Huang, IuonChang Lin, and MinShiang Hwang, Vol. 22, No. 6, 2020, pp. 897904 Article Full Text PDF 

2.  A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval


Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim, Vol. 22, No. 6, 2020, pp. 905910 Article Full Text PDF 

3.  Constructions of Balanced Quaternary Sequences of Even Length


Jinfeng Chong and Zepeng Zhuo, Vol. 22, No. 6, 2020, pp. 911915 Article Full Text PDF 

4.  Research on Intrusion Detection Method Based on Hierarchical Selfconvergence PCAOCSVM Algorithm


Yanpeng Cui, Zichuan Jin, and Jianwei Hu, Vol. 22, No. 6, 2020, pp. 916924 Article Full Text PDF 

5.  Analyzing System Log Based on Machine Learning Model


ChiaMei Chen, GenHong Syu, and ZhengXun Cai, Vol. 22, No. 6, 2020, pp. 925933 Article Full Text PDF 

6.  Efficient and Secure Outsourcing of Modular Exponentiation Based on Smart Contract


Danting Xu, Yanli Ren, Xiangyu Li, and Guorui Feng, Vol. 22, No. 6, 2020, pp. 934944 Article Full Text PDF 

7.  A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service


Baoyuan Kang, Jianqi Du, Yanbao Han, and Kun Qian, Vol. 22, No. 6, 2020, pp. 945953 Article Full Text PDF 

8.  Experimental Study on the Influence of Satellite Spoofing on Power Timing Synchronization


Jianwu Zhang, Xinyu Luo, Xingbing Fu, Xuxu Wang, Chunsheng Guo, and Yanan Bai, Vol. 22, No. 6, 2020, pp. 954960 Article Full Text PDF 

9.  Some Further Results of Pseudorandom Binary Sequences Derived from the Discrete Logarithm in Finite Fields


Vladimir A Edemskiy, Zhixiong Chen, Sergey Garbar, Vol. 22, No. 6, 2020, pp. 961965 Article Full Text PDF 

10.  Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening


Chengkai Yang, Zhihong Li, Wenxia Cai, Shaowei Weng, Li Liu, and Anhong Wang, Vol. 22, No. 6, 2020, pp. 966974 Article Full Text PDF 

11.  Finegrained Identification for SSL/TLS Packets


Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang, Vol. 22, No. 6, 2020, pp. 975980 Article Full Text PDF 

12.  A Blockchainbased PrivacyPreserving Authentication Scheme with Anonymous Identity in Vehicular Networks


Liang Wang, Dong Zheng, Rui Guo, ChenCheng Hu, and ChunMing Jing, Vol. 22, No. 6, 2020, pp. 981990 Article Full Text PDF 

13.  A Literature Survey of Visual Similarity Snooping Attacks in Emails


George Mwangi Muhindi, Georey MarigaWambugu, and Aaron Mogeni Oirere, Vol. 22, No. 6, 2020, pp. 991996 Article Full Text PDF 

14.  Network Security Model for Multiparallel Wireless Communication based on BMNS


Fengfei Kuang, Vol. 22, No. 6, 2020, pp. 9971003 Article Full Text PDF 

15.  Malicious Attack Detection Algorithm of Internet of Vehicles based on CWKNN


PengShou Xie, Cheng Fu, Tao Feng, Yan Yan, and LiangLu Li, Vol. 22, No. 6, 2020, pp. 10041014 Article Full Text PDF 

16.  AntiSPA Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve


ShuangGen Liu, Xin Heng, and YuanMeng Li, Vol. 22, No. 6, 2020, pp. 10151021 Article Full Text PDF 

17.  Classifying Malware Images with Convolutional Neural Network Models


Ahmed Bensaoud, Nawaf Abudawaood, and Jugal Kalita, Vol. 22, No. 6, 2020, pp. 10221031 Article Full Text PDF 

18.  Analysis of One Fully Homomorphic Encryption Scheme in ClientServer Computing Scenario


Yang Li and Lihua Liu, Vol. 22, No. 6, 2020, pp. 10321036 Article Full Text PDF 

19.  AttackDefense Game Model: Research on Dynamic Defense Mechanism of Network Security


Xuhua Zhao, Vol. 22, No. 6, 2020, pp. 10371042 Article Full Text PDF 

20.  Multiformat Speech Perception Hashing Algorithm Based on ShortTime Logarithmic Energy and Improved Mel Energy Parameter Fusion


YiBo Huang, Yong Wang, QiuYu Zhang, and HeXiang Hou, Vol. 22, No. 6, 2020, pp. 10431053 Article Full Text PDF 

24.  Reviewer index to volume 22 (2020) Reviewers (Volume 22, 2020)  