Quick Search:

Volume: 22, No: 6 (November 1, 2020)

International Journal of Network Security

1. Research on Blockchain Technologies in Bidding Systems
Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 22, No. 6, 2020, pp. 897-904
Article Full Text PDF

2. A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval
Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim, Vol. 22, No. 6, 2020, pp. 905-910
Article Full Text PDF

3. Constructions of Balanced Quaternary Sequences of Even Length
Jinfeng Chong and Zepeng Zhuo, Vol. 22, No. 6, 2020, pp. 911-915
Article Full Text PDF

4. Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm
Yanpeng Cui, Zichuan Jin, and Jianwei Hu, Vol. 22, No. 6, 2020, pp. 916-924
Article Full Text PDF

5. Analyzing System Log Based on Machine Learning Model
Chia-Mei Chen, Gen-Hong Syu, and Zheng-Xun Cai, Vol. 22, No. 6, 2020, pp. 925-933
Article Full Text PDF

6. Efficient and Secure Outsourcing of Modular Exponentiation Based on Smart Contract
Danting Xu, Yanli Ren, Xiangyu Li, and Guorui Feng, Vol. 22, No. 6, 2020, pp. 934-944
Article Full Text PDF

7. A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service
Baoyuan Kang, Jianqi Du, Yanbao Han, and Kun Qian, Vol. 22, No. 6, 2020, pp. 945-953
Article Full Text PDF

8. Experimental Study on the Influence of Satellite Spoofing on Power Timing Synchronization
Jianwu Zhang, Xinyu Luo, Xingbing Fu, Xuxu Wang, Chunsheng Guo, and Yanan Bai, Vol. 22, No. 6, 2020, pp. 954-960
Article Full Text PDF

9. Some Further Results of Pseudorandom Binary Sequences Derived from the Discrete Logarithm in Finite Fields
Vladimir A Edemskiy, Zhixiong Chen, Sergey Garbar, Vol. 22, No. 6, 2020, pp. 961-965
Article Full Text PDF

10. Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening
Chengkai Yang, Zhihong Li, Wenxia Cai, Shaowei Weng, Li Liu, and Anhong Wang, Vol. 22, No. 6, 2020, pp. 966-974
Article Full Text PDF

11. Fine-grained Identification for SSL/TLS Packets
Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang, Vol. 22, No. 6, 2020, pp. 975-980
Article Full Text PDF

12. A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks
Liang Wang, Dong Zheng, Rui Guo, ChenCheng Hu, and ChunMing Jing, Vol. 22, No. 6, 2020, pp. 981-990
Article Full Text PDF

13. A Literature Survey of Visual Similarity Snooping Attacks in Emails
George Mwangi Muhindi, Georey MarigaWambugu, and Aaron Mogeni Oirere, Vol. 22, No. 6, 2020, pp. 991-996
Article Full Text PDF

14. Network Security Model for Multi-parallel Wireless Communication based on BMNS
Fengfei Kuang, Vol. 22, No. 6, 2020, pp. 997-1003
Article Full Text PDF

15. Malicious Attack Detection Algorithm of Internet of Vehicles based on CW-KNN
Peng-Shou Xie, Cheng Fu, Tao Feng, Yan Yan, and Liang-Lu Li, Vol. 22, No. 6, 2020, pp. 1004-1014
Article Full Text PDF

16. Anti-SPA Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
Shuang-Gen Liu, Xin Heng, and Yuan-Meng Li, Vol. 22, No. 6, 2020, pp. 1015-1021
Article Full Text PDF

17. Classifying Malware Images with Convolutional Neural Network Models
Ahmed Bensaoud, Nawaf Abudawaood, and Jugal Kalita, Vol. 22, No. 6, 2020, pp. 1022-1031
Article Full Text PDF

18. Analysis of One Fully Homomorphic Encryption Scheme in Client-Server Computing Scenario
Yang Li and Lihua Liu, Vol. 22, No. 6, 2020, pp. 1032-1036
Article Full Text PDF

19. Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
Xuhua Zhao, Vol. 22, No. 6, 2020, pp. 1037-1042
Article Full Text PDF

20. Multi-format Speech Perception Hashing Algorithm Based on Short-Time Logarithmic Energy and Improved Mel Energy Parameter Fusion
Yi-Bo Huang, Yong Wang, Qiu-Yu Zhang, and He-Xiang Hou, Vol. 22, No. 6, 2020, pp. 1043-1053
Article Full Text PDF

24. Reviewer index to volume 22 (2020) Reviewers (Volume 22, 2020)