International Journal of Network Security | ||
1. | Research on Blockchain Technologies in Bidding Systems
|
|
Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 22, No. 6, 2020, pp. 897-904 Article Full Text PDF |
||
2. | A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval
|
|
Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim, Vol. 22, No. 6, 2020, pp. 905-910 Article Full Text PDF |
||
3. | Constructions of Balanced Quaternary Sequences of Even Length
|
|
Jinfeng Chong and Zepeng Zhuo, Vol. 22, No. 6, 2020, pp. 911-915 Article Full Text PDF |
||
4. | Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm
|
|
Yanpeng Cui, Zichuan Jin, and Jianwei Hu, Vol. 22, No. 6, 2020, pp. 916-924 Article Full Text PDF |
||
5. | Analyzing System Log Based on Machine Learning Model
|
|
Chia-Mei Chen, Gen-Hong Syu, and Zheng-Xun Cai, Vol. 22, No. 6, 2020, pp. 925-933 Article Full Text PDF |
||
6. | Efficient and Secure Outsourcing of Modular Exponentiation Based on Smart Contract
|
|
Danting Xu, Yanli Ren, Xiangyu Li, and Guorui Feng, Vol. 22, No. 6, 2020, pp. 934-944 Article Full Text PDF |
||
7. | A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service
|
|
Baoyuan Kang, Jianqi Du, Yanbao Han, and Kun Qian, Vol. 22, No. 6, 2020, pp. 945-953 Article Full Text PDF |
||
8. | Experimental Study on the Influence of Satellite Spoofing on Power Timing Synchronization
|
|
Jianwu Zhang, Xinyu Luo, Xingbing Fu, Xuxu Wang, Chunsheng Guo, and Yanan Bai, Vol. 22, No. 6, 2020, pp. 954-960 Article Full Text PDF |
||
9. | Some Further Results of Pseudorandom Binary Sequences Derived from the Discrete Logarithm in Finite Fields
|
|
Vladimir A Edemskiy, Zhixiong Chen, Sergey Garbar, Vol. 22, No. 6, 2020, pp. 961-965 Article Full Text PDF |
||
10. | Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening
|
|
Chengkai Yang, Zhihong Li, Wenxia Cai, Shaowei Weng, Li Liu, and Anhong Wang, Vol. 22, No. 6, 2020, pp. 966-974 Article Full Text PDF |
||
11. | Fine-grained Identification for SSL/TLS Packets
|
|
Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang, Vol. 22, No. 6, 2020, pp. 975-980 Article Full Text PDF |
||
12. | A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks
|
|
Liang Wang, Dong Zheng, Rui Guo, ChenCheng Hu, and ChunMing Jing, Vol. 22, No. 6, 2020, pp. 981-990 Article Full Text PDF |
||
13. | A Literature Survey of Visual Similarity Snooping Attacks in Emails
|
|
George Mwangi Muhindi, Georey MarigaWambugu, and Aaron Mogeni Oirere, Vol. 22, No. 6, 2020, pp. 991-996 Article Full Text PDF |
||
14. | Network Security Model for Multi-parallel Wireless Communication based on BMNS
|
|
Fengfei Kuang, Vol. 22, No. 6, 2020, pp. 997-1003 Article Full Text PDF |
||
15. | Malicious Attack Detection Algorithm of Internet of Vehicles based on CW-KNN
|
|
Peng-Shou Xie, Cheng Fu, Tao Feng, Yan Yan, and Liang-Lu Li, Vol. 22, No. 6, 2020, pp. 1004-1014 Article Full Text PDF |
||
16. | Anti-SPA Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
|
|
Shuang-Gen Liu, Xin Heng, and Yuan-Meng Li, Vol. 22, No. 6, 2020, pp. 1015-1021 Article Full Text PDF |
||
17. | Classifying Malware Images with Convolutional Neural Network Models
|
|
Ahmed Bensaoud, Nawaf Abudawaood, and Jugal Kalita, Vol. 22, No. 6, 2020, pp. 1022-1031 Article Full Text PDF |
||
18. | Analysis of One Fully Homomorphic Encryption Scheme in Client-Server Computing Scenario
|
|
Yang Li and Lihua Liu, Vol. 22, No. 6, 2020, pp. 1032-1036 Article Full Text PDF |
||
19. | Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
|
|
Xuhua Zhao, Vol. 22, No. 6, 2020, pp. 1037-1042 Article Full Text PDF |
||
20. | Multi-format Speech Perception Hashing Algorithm Based on Short-Time Logarithmic Energy and Improved Mel Energy Parameter Fusion
|
|
Yi-Bo Huang, Yong Wang, Qiu-Yu Zhang, and He-Xiang Hou, Vol. 22, No. 6, 2020, pp. 1043-1053 Article Full Text PDF |
||
24. | Reviewer index to volume 22 (2020) Reviewers (Volume 22, 2020) | |