Quick Search:

Online First:

International Journal of Network Security

1. An Efficient RFID Authentication Protocol Using Dynamic Identity
Shin-Yan Chiou
Article Full Text PDF

2. Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace
Budi Gunawan and Barito Mulyo Ratmono
Article Full Text PDF

3. Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants
Hui Xiaa and Weiji Yang
Article Full Text PDF

4. Security Evaluation of Computer Network Based on Hierarchy
Linbin Wen
Article Full Text PDF

5. Network Security Threat Detection under Big Data by Using Machine Learning
Jinbao He, Jie Yang, Kangjian Ren, Wenjing Zhang, and Guiquan Li
Article Full Text PDF

6. Joint Source-Relay Selection Scheme for Cooperative Networks under Eavesdropping Environment
Jianbin Xue, Heng Zhu, Xiaoming Liao, and Zhe Su
Article Full Text PDF

7. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
Shidong Zhang, Tongjiang Yan, Yuhua Sun, and Lianhai Wang
Article Full Text PDF

8. A Provably Secure Group Authentication Protocol for Various LTE Networks
Boriphat Kijjabuncha and Pipat Hiranvanichakorn
Article Full Text PDF

9. Probabilistic RSA with Homomorphism and Its Applications
Yaling Geng, Shundong Li, and Sufang Zhou
Article Full Text PDF

10. Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks
N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah
Article Full Text PDF

11. Leakage-resilient Attribute-based Encryption with CCA2 Security
Leyou Zhang and Yujie Shang
Article Full Text PDF

12. Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction
Zhen-Hua Liu, Yuan-Yuan Li, Dong Yuan, and Yao-Hui Liu
Article Full Text PDF

13. Augmented Hill Cipher
AbdAllah A. ElHabshy
Article Full Text PDF

14. Attribute Based Encryption with Efficient Revocation from Lattices
Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu
Article Full Text PDF

15. Quadrivium: A Trivium-Inspired Pseudorandom Number Generator
Latoya Jackson and Yesem Kurt Peker
Article Full Text PDF

16. Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
Cossi Blaise Avoussoukpo, Chunxiang Xu, and Marius Tchenagnon
Article Full Text PDF

17. Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images
Xiaofeng Chen and Wenlong Guo
Article Full Text PDF

18. Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server
Jiaxiang Yang, Yanping Li, and Yanli Ren
Article Full Text PDF

19. URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks
Putra Wanda and Huang Jin Jie
Article Full Text PDF

20. Correlation Functions of m-Sequences of Different Lengths
Zepeng Zhuo, Jinfeng Chong, and Lei Yu
Article Full Text PDF

21. Cryptanalysis of An Improved Predicate Encryption Scheme from LWE
Chengbo Xu
Article Full Text PDF

22. An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain
Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, and Yang Sun
Article Full Text PDF

23. A Novel SVD and LWT Based Robust Blind Audio Water-marking Scheme
Wenliang Wu
Article Full Text PDF

24. Identifying Anomalous Geographical Routing Based on the Network Delay
Evgeny Sagatov, Konstantin Lovtsov, and Andrei Sukhov
Article Full Text PDF

25. Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security
Liyan Wang, Juntao Gao, and Xuelian Li
Article Full Text PDF

26. A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks
Ikjot Sain, Sherif Saad, and Arunita Jaekel
Article Full Text PDF

27. A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment
Shoulin Yin, Hang Li, and Lin Teng
Article Full Text PDF

28. A New Chi-square Distribution De-noising Method for Image Encryption
Shoulin Yin, Hang Li, and Lin Teng
Article Full Text PDF

29. Secure High Capacity Data Hiding Scheme based on Reference Matrix
Xiao-Shuang Li, Chin-Chen Chang, Ming-Xing He, and Chia-Chen Lin
Article Full Text PDF

30. An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm
Rui-Hong Dong, Hou-Hua Yan, and Qiu-Yu Zhang
Article Full Text PDF

31. Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing
Emmanuel Mugabo and Qiu-Yu Zhang
Article Full Text PDF

32. A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis
Yang Chen and Yonghong Chen
Article Full Text PDF

33. Identity Based Key-Insulated Encryption with Outsourced Equality Test
Seth Alornyo, Yanan Zhao, Guobin Zhu, and Hu Xiong
Article Full Text PDF

34. A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics
Yong-Bing Zhang, Qiu-Yu Zhang, Zong-Yi Li, Yan Yan, and Mo-Yi Zhang
Article Full Text PDF

35. Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group
Chu Zhao, Shoulin Yin, Hang Li, and Yang Sun
Article Full Text PDF

36. Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing
Wei-Liang Tai, Ya-Fen Chang, and Wen-Hsin Huang
Article Full Text PDF

37. Run-based Modular Reduction Method
Zhengjun Cao, Zhen Chen, Ruizhong Wei, and Lihua Liu
Article Full Text PDF

38. An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol
Gao-Feng Shen, Shu-Min Gu, and Dao-Wei Liu
Article Full Text PDF

39. Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
Wei-Liang Tai, Ya-Fen Chang, and Po-Lin Hou
Article Full Text PDF

40. Anomaly Detection for Network Flow Using Immune Network and Density Peak
Yuanquan Shi and Hong Shen
Article Full Text PDF

41. Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
Peng-Shou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guo-qiang Ma, and Xue-Ming Han
Article Full Text PDF

42. Role Mining Algorithms Satisfied the Permission Cardinality Constraint
Jingyu Wang, Jingnan Dong, and Yuesheng Tan
Article Full Text PDF

43. Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage
Qianlong Dang, Hua Ma, Zhenhua Liu, and Ying Xie
Article Full Text PDF

44. Privacy-preserving Computational Geometry
Qiong Wei, Shundong Li, Wenli Wang, and Yanjing Yang
Article Full Text PDF

45. Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography
Majid Bayat, Mohammad Beheshti Atashgah, Morteza Barari, and Mohammad Reza Aref
Article Full Text PDF

46. A Dynamic Location Privacy Protection Scheme Based on Cloud Storage
Li Li, Zhengjuan Lv, Xiaohong Tong, and Runhua Shi
Article Full Text PDF

47. Differentially Private Transmission Control Protocol Synchronize Packet Counts
Nenekazi Nokuthala P. Mkuzangwe and Fulufhelo Nelwamondo
Article Full Text PDF

48. Forensic Analysis of Social Networks Based on Instagram
Ming Sang Chang and Chih Ping Yen
Article Full Text PDF

49. Packet Watermarking With ECG Biological Feature
KKuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, and Xiangmin Guo
Article Full Text PDF

50. A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree
Yang Sun, Shoulin Yin, Jie Liu, and Lin Teng
Article Full Text PDF

51. Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell
Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, and Yu-Chen Hu
Article Full Text PDF

52. Cryptanalysis and Improvement of a Smart Card Based Authentication Scheme for Multi-server Architecture Using ECC
Tao Wan, Xiaochang Liu, Weichuan Liao, and Nan Jiang
Article Full Text PDF

53. Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing
Hua Ma, Guo-Hua Tian, and Lin-Chao Zhang
Article Full Text PDF

54. A Note On One Secure Data Self-Destructing Scheme In Cloud Computing
Lihua Liu, Yang Li, Zhengjun Cao, and Zhen Chen
Article Full Text PDF

55. Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model
Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, and Bo Meng
Article Full Text PDF

56. Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce
Jia-Qi Wang, Yun-Feng Zhang, and Dao-Wei Liu
Article Full Text PDF

57. Certificateless Ring Signcryption Scheme from Pairings
Hui Guo and Lunzhi Deng
Article Full Text PDF

58. Efficient Near-Duplicate Document Detection Using Consistent Weighted Sampling Filter
Xinpan Yuan, Songlin Wang, Cheng Peng, and Chengyuan Zhang
Article Full Text PDF

59. Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange
Ou Ruan, Zihao Wang, Qingping Wang, and Mingwu Zhang
Article Full Text PDF

60. A Formal Framework of Shielding Systems by Stepwise Refinement
Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, and Yan Xiong
Article Full Text PDF

61. StegoNote: Steganography in Guitar Music Using Note Modulation
Hui Tian, Zhaohua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, and Yiqiao Cai
Article Full Text PDF

62. A Modified Advanced Encryption Standard for Data Security
Lin Teng, Hang Li, Shoulin Yin, and Yang Sun
Article Full Text PDF

63. A PSO-based Wavelet-core ELM for Abnormal Flow Detection
Yueyang Su, Jing Wan, and Junkai Yi
Article Full Text PDF

64. A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding
Chin-Chen Chang, Jun-Yong Chen, Yan-Hong Chen, and Yanjun Liu
Article Full Text PDF

65. Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications
Jianmeng Huang, Wenchao Huang, Fuyou Miao, and Yan Xiong
Article Full Text PDF

66. On the Security of a Practical Constant-Size Ring Signature Scheme
Jianhong Zhang, Wenle Bai, and Zhengtao Jiang
Article Full Text PDF

67. Static Analysis of Superfluous Network Transmissions in Android Applications
Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, and Yan Xiong
Article Full Text PDF

68. One-Code-Pass User Authentication Based on QR Code and Secret Sharing
Yanjun Liu, Chin-Chen Chang, and Peng-Cheng Huang
Article Full Text PDF

69. Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption
Shoulin Yin, Jie Liu, and Lin Teng
Article Full Text PDF

70. A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
Xu Zhao, Guangqiu Huang, and Reza Mousoli
Article Full Text PDF

71. Android Malware Detection Approaches in Combination with Static and Dynamic Features
Ming-Yang Su, Jer-Yuan Chang, and Kek-Tung Fung
Article Full Text PDF

72. Malware Traffic Classification Based on Recurrence Quantification Analysis
Zheng-Zhi Tang, Xue-Wen Zeng, Zhi-Chuan Guo, and Man-Gu Song
Article Full Text PDF

73. Efficient Group Signature Scheme without Pairings
Ke Gu, Dianxing Liu, and Bo~Yin
Article Full Text PDF

74. Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m)
Shuang-Gen Liu, Shi-Mei Lu, and Rui-Wen Gong
Article Full Text PDF

75. Multi-Parameter and Time Series Based Trust for IoT Smart Sensors
Zhi-Ge He
Article Full Text PDF