Quick Search:

Paper Preview:

International Journal of Network Security

1. Extension of PCL Theory and Its Application in Improved CCITT X.509 Analysis
Lei Yu, Zhi-Yao Yang, and Ze-Peng Zhuo
Article Full Text PDF

2. Partitioned Group Password-based Authenticated Key Exchange with Privacy Protection
Hongfeng Zhu, Yuanle Zhang, Xueying Wang, and Liwei Wang
Article Full Text PDF

3. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
Dan Zhu, Liwei Wang, and Hongfeng Zhu
Article Full Text PDF

4. Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm
Yanpeng Cui, Zichuan Jin, and Jianwei Hu
Article Full Text PDF

5. Detect Fast-Flux Domain Name with DGA through IP Fluctuation
Hongling Jiang and Jinzhi Lin
Article Full Text PDF

6. An Electronic Voting Scheme Based on LUC Secret System and Secret Sharing
Hongquan Pu, Zhe Cui, Ting Liu, Zhihan Wu, and Hongjiang Du
Article Full Text PDF

7. A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval
Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim
Article Full Text PDF

8. A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks
Liang Wang, Dong Zheng, Rui Guo, ChenCheng Hu, and ChunMing Jing
Article Full Text PDF

9. An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing
Ze Wang, Minghua Gao, Lu Chen, and Shimin Sun
Article Full Text PDF

10. Anti-SPA Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
Shuang-Gen Liu, Xin Heng, and Yuan-Meng Li
Article Full Text PDF

11. Analysis of One Fully Homomorphic Encryption Scheme in Client-Server Computing Scenario
Yang Li and Lihua Liu
Article Full Text PDF

12. Fine-grained Identification for SSL/TLS Packets
Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang
Article Full Text PDF

13. Privacy-Preserving and Verifiable Electronic Voting Scheme Based on Smart Contract of Blockchain
Ting Liu, Zhe Cui, Hongjiang Du, and Zhihan Wu
Article Full Text PDF

14. Constructions of Balanced Quaternary Sequences of Even Length
Jinfeng Chong and Zepeng Zhuo
Article Full Text PDF

15. A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service
Baoyuan Kang, Jianqi Du, Yanbao Han, and Kun Qian
Article Full Text PDF

16. Multi-format Speech Perception Hashing Algorithm Based on Short-Time Logarithmic Energy and Improved Mel Energy Parameter Fusion
Yi-Bo Huang, Yong Wang, Qiu-Yu Zhang, and He-Xiang Hou
Article Full Text PDF

17. ECID: Elliptic Curve Identity-based Blind Signature Scheme
Shoulin Yin, Hang Li, Shahid Karim, and Yang Sun
Article Full Text PDF

18. A Sensitive-Information Hiding Treatment in Quick-Response Codes Based on Error-Correcting Framework
Mingwu Zhang, Xiao Chen, Yong Ding, and Hua Shen
Article Full Text PDF

19. Adaptive Fine-grained Access Control Method in Social Internet of Things
Hongbin Zhang, Pengcheng Ma, and Bin Liu
Article Full Text PDF

20. Information Aggregation Method of Intuitionistic Fuzzy Set Pair Analysis in Multi-Attribute Privacy Risk Decision-Making
Yan Yan, Bingqian Wang, Lianxiu Zhang, and Xin Gao
Article Full Text PDF

21. Experimental Study on the Influence of Satellite Spoofing on Power Timing Synchronization
Jianwu Zhang, Xinyu Luo, Xingbing Fu, Xuxu Wang, Chunsheng Guo, and Yanan Bai
Article Full Text PDF

22. Additively Homomorphic IBE with Auxiliary Input for Big Data Security
Zhiwei Wang, Congcong Zhu, Nianhua Yang, and Zhanlin Wang
Article Full Text PDF

23. A Lightweight User Authentication Scheme Based on Fuzzy Extraction Technology for Wireless Sensor Networks
Rui-Hong Dong, Bu-Bu Ren, Qiu-Yu Zhang, and Hui Yuan
Article Full Text PDF

24. An Identity Authentication Scheme of Energy Internet Based on Blockchain
Xiuxia Tian, Xi Chen, and Siqian Li
Article Full Text PDF

25. A k-Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution
Yong-Bing Zhang, Qiu-Yu Zhang, Yan Yan, Yi-Long Jiang, and Mo-Yi Zhang
Article Full Text PDF

26. Enhanced Deduplication Protocol for Side Channel in Cloud Storages
Jie Ouyang, Huiran Zhang, Hongqing Hu, Xiao Wei, and Dongbo Dai
Article Full Text PDF

27. Security Bound of Biclique Attacks on AES-128
Xiaoli Dong and Jie Che
Article Full Text PDF

28. Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts
Changchun Yan, Guoyou Zhang, Anhong Wang, Li Liu, and Chin-Chen Chang
Article Full Text PDF

29. A Differentially Private K-means Clustering Scheme for Smart Grid
Shuai Guo, Mi Wen, and Xiaohui Liang
Article Full Text PDF

30. Detection and Prevention of Jellyfish Attacks Using kNN Algorithm and Trusted Routing Scheme in MANET
Zulfiqar Ali Zardari, Jingsha He, Muhammad Salman Pathan, Sirajuddin Qureshi, Muhammad Iftikhar Hussain, Fahad Razaque, Peng He, and Nafei Zhu
Article Full Text PDF

31. Personalized K-In&Out-Degree Anonymity Method for Large-scale Social Networks Based on Hierarchical Community Structure
XiaoLin Zhang, Jiao Liu, HongJing Bi, Jian Li, and YongPing Wang
Article Full Text PDF

32. Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening
Chengkai Yang, Zhihong Li, Wenxia Cai, Shaowei Weng, Li Liu, and Anhong Wang
Article Full Text PDF

33. IIntrusion Detection Method Based on MapReduce for Evolutionary Feature Selection in Mobile Cloud Computing
Emmanuel Mugabo, Qiu-Yu Zhang, Aristide Ngaboyindekwe, Vincent de Paul Niyigena Kwizera, and Victus Elikplim Lumorvie
Article Full Text PDF

34. A P2P Anonymous Communication Scheme in IOT Based on Blockchain
Ye Lu
Article Full Text PDF

35. An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix
Jiang-Yi Lin, Yu Chen,Chin-Chen Chang, and Yu-Chen Hu
Article Full Text PDF