| International Journal of Network Security | ||
| 1. | Research on Blockchain Technologies in Bidding Systems
|
|
| Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 22, No. 6, 2020, pp. 897-904 Article Full Text PDF |
||
| 2. | A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval
|
|
| Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim, Vol. 22, No. 6, 2020, pp. 905-910 Article Full Text PDF |
||
| 3. | Constructions of Balanced Quaternary Sequences of Even Length
|
|
| Jinfeng Chong and Zepeng Zhuo, Vol. 22, No. 6, 2020, pp. 911-915 Article Full Text PDF |
||
| 4. | Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm
|
|
| Yanpeng Cui, Zichuan Jin, and Jianwei Hu, Vol. 22, No. 6, 2020, pp. 916-924 Article Full Text PDF |
||
| 5. | Analyzing System Log Based on Machine Learning Model
|
|
| Chia-Mei Chen, Gen-Hong Syu, and Zheng-Xun Cai, Vol. 22, No. 6, 2020, pp. 925-933 Article Full Text PDF |
||
| 6. | Efficient and Secure Outsourcing of Modular Exponentiation Based on Smart Contract
|
|
| Danting Xu, Yanli Ren, Xiangyu Li, and Guorui Feng, Vol. 22, No. 6, 2020, pp. 934-944 Article Full Text PDF |
||
| 7. | A Lightweight Anonymous Mobile Payment Scheme for Digital Commodity in Cloud Computing Service
|
|
| Baoyuan Kang, Jianqi Du, Yanbao Han, and Kun Qian, Vol. 22, No. 6, 2020, pp. 945-953 Article Full Text PDF |
||
| 8. | Experimental Study on the Influence of Satellite Spoofing on Power Timing Synchronization
|
|
| Jianwu Zhang, Xinyu Luo, Xingbing Fu, Xuxu Wang, Chunsheng Guo, and Yanan Bai, Vol. 22, No. 6, 2020, pp. 954-960 Article Full Text PDF |
||
| 9. | Some Further Results of Pseudorandom Binary Sequences Derived from the Discrete Logarithm in Finite Fields
|
|
| Vladimir A Edemskiy, Zhixiong Chen, Sergey Garbar, Vol. 22, No. 6, 2020, pp. 961-965 Article Full Text PDF |
||
| 10. | Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening
|
|
| Chengkai Yang, Zhihong Li, Wenxia Cai, Shaowei Weng, Li Liu, and Anhong Wang, Vol. 22, No. 6, 2020, pp. 966-974 Article Full Text PDF |
||
| 11. | Fine-grained Identification for SSL/TLS Packets
|
|
| Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang, Vol. 22, No. 6, 2020, pp. 975-980 Article Full Text PDF |
||
| 12. | A Blockchain-based Privacy-Preserving Authentication Scheme with Anonymous Identity in Vehicular Networks
|
|
| Liang Wang, Dong Zheng, Rui Guo, ChenCheng Hu, and ChunMing Jing, Vol. 22, No. 6, 2020, pp. 981-990 Article Full Text PDF |
||
| 13. | A Literature Survey of Visual Similarity Snooping Attacks in Emails
|
|
| George Mwangi Muhindi, Georey MarigaWambugu, and Aaron Mogeni Oirere, Vol. 22, No. 6, 2020, pp. 991-996 Article Full Text PDF |
||
| 14. | Network Security Model for Multi-parallel Wireless Communication based on BMNS
|
|
| Fengfei Kuang, Vol. 22, No. 6, 2020, pp. 997-1003 Article Full Text PDF |
||
| 15. | Malicious Attack Detection Algorithm of Internet of Vehicles based on CW-KNN
|
|
| Peng-Shou Xie, Cheng Fu, Tao Feng, Yan Yan, and Liang-Lu Li, Vol. 22, No. 6, 2020, pp. 1004-1014 Article Full Text PDF |
||
| 16. | Anti-SPA Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
|
|
| Shuang-Gen Liu, Xin Heng, and Yuan-Meng Li, Vol. 22, No. 6, 2020, pp. 1015-1021 Article Full Text PDF |
||
| 17. | Classifying Malware Images with Convolutional Neural Network Models
|
|
| Ahmed Bensaoud, Nawaf Abudawaood, and Jugal Kalita, Vol. 22, No. 6, 2020, pp. 1022-1031 Article Full Text PDF |
||
| 18. | Analysis of One Fully Homomorphic Encryption Scheme in Client-Server Computing Scenario
|
|
| Yang Li and Lihua Liu, Vol. 22, No. 6, 2020, pp. 1032-1036 Article Full Text PDF |
||
| 19. | Attack-Defense Game Model: Research on Dynamic Defense Mechanism of Network Security
|
|
| Xuhua Zhao, Vol. 22, No. 6, 2020, pp. 1037-1042 Article Full Text PDF |
||
| 20. | Multi-format Speech Perception Hashing Algorithm Based on Short-Time Logarithmic Energy and Improved Mel Energy Parameter Fusion
|
|
| Yi-Bo Huang, Yong Wang, Qiu-Yu Zhang, and He-Xiang Hou, Vol. 22, No. 6, 2020, pp. 1043-1053 Article Full Text PDF |
||
| 24. | Reviewer index to volume 22 (2020) Reviewers (Volume 22, 2020) | |