Quick Search:

Volume: 23, No: 1 (January 1, 2021)

International Journal of Network Security

1. Research on Security and Performance of Blockchain with Innovation Architecture Technology
Cheng-Ying Lin, Li-Chin Huang, Yi-Hui Chen, and Min-Shiang Hwang, Vol. 23, No. 1, 2021, pp. 1-8
Article Full Text PDF

2. ECID: Elliptic Curve Identity-based Blind Signature Scheme
Shoulin Yin, Hang Li, Shahid Karim, and Yang Sun, Vol. 23, No. 1, 2021, pp. 9-13
Article Full Text PDF

3. A Sensitive-Information Hiding Treatment in Quick-Response Codes Based on Error-Correcting Framework
Mingwu Zhang, Xiao Chen, Yong Ding, and Hua Shen, Vol. 23, No. 1, 2021, pp. 14-21
Article Full Text PDF

4. Information Aggregation Method of Intuitionistic Fuzzy Set Pair Analysis in Multi-Attribute Privacy Risk Decision-Making
Yan Yan, Bingqian Wang, Lianxiu Zhang, and Xin Gao, Vol. 23, No. 1, 2021, pp. 22-32
Article Full Text PDF

5. Design and Implementation of Random Number Generator System Based on Android Smartphone Sens
Yusuf Kurniawan and Mochamad Beta Auditama, Vol. 23, No. 1, 2021, pp. 33-41
Article Full Text PDF

6. Adaptive Fine-grained Access Control Method in Social Internet of Things
Hongbin Zhang, Pengcheng Ma, and Bin Liu, Vol. 23, No. 1, 2021, pp. 42-48
Article Full Text PDF

7. A P2P Anonymous Communication Scheme in IOT Based on Blockchain
Ye Lu, Vol. 23, No. 1, 2021, pp. 49-56
Article Full Text PDF

8. A k-Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution
Yong-Bing Zhang, Qiu-Yu Zhang, Yan Yan, Yi-Long Jiang, and Mo-Yi Zhang, Vol. 23, No. 1, 2021, pp. 57-66
Article Full Text PDF

9. Applying Permutations and Cuckoo Search for Obtaining a New Steganography Approach in Spatial Domain
Dieaa I. Nassr and Sohier M. Khamis, Vol. 23, No. 1, 2021, pp. 67-76
Article Full Text PDF

10. Detection and Prevention of Jellyfish Attacks Using kNN Algorithm and Trusted Routing Scheme in MANET
Zulfiqar Ali Zardari, Jingsha He, Muhammad Salman Pathan, Sirajuddin Qureshi, Muhammad Iftikhar Hussain, Fahad Razaque, Peng He, and Nafei Zhu, Vol. 23, No. 1, 2021, pp. 77-87
Article Full Text PDF

11. Detect Fast-Flux Domain Name with DGA through IP Fluctuation
Hongling Jiang and Jinzhi Lin, Vol. 23, No. 1, 2021, pp. 88-96
Article Full Text PDF

12. An Electronic Voting Scheme Based on LUC Secret System and Secret Sharing
Hongquan Pu, Zhe Cui, Ting Liu, Zhihan Wu, and Hongjiang Du, Vol. 23, No. 1, 2021, pp. 97-105
Article Full Text PDF

13. Intrusion Detection Method Based on MapReduce for Evolutionary Feature Selection in Mobile Cloud Computing
Emmanuel Mugabo, Qiu-Yu Zhang, Aristide Ngaboyindekwe, Vincent de Paul Niyigena Kwizera, and Victus Elikplim Lumorvie, Vol. 23, No. 1, 2021, pp. 106-115
Article Full Text PDF

14. Partitioned Group Password-based Authenticated Key Exchange with Privacy Protection
Hongfeng Zhu, Yuanle Zhang, Xueying Wang, and Liwei Wang, Vol. 23, No. 1, 2021, pp. 116-125
Article Full Text PDF

15. A Differentially Private K-means Clustering Scheme for Smart Grid
Shuai Guo, Mi Wen, and Xiaohui Liang, Vol. 23, No. 1, 2021, pp. 126-134
Article Full Text PDF

16. Additively Homomorphic IBE with Auxiliary Input for Big Data Security
Zhiwei Wang, Congcong Zhu, Nianhua Yang, and Zhanlin Wang, Vol. 23, No. 1, 2021, pp. 135-142
Article Full Text PDF

17. An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing
Ze Wang, Minghua Gao, Lu Chen, and Shimin Sun, Vol. 23, No. 1, 2021, pp. 143-156
Article Full Text PDF

18. A Lightweight User Authentication Scheme Based on Fuzzy Extraction Technology for Wireless Sensor Networks
Rui-Hong Dong, Bu-Bu Ren, Qiu-Yu Zhang, and Hui Yuan, Vol. 23, No. 1, 2021, pp. 157-171
Article Full Text PDF

19. Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts
Changchun Yan, Guoyou Zhang, Anhong Wang, Li Liu, and Chin-Chen Chang, Vol. 23, No. 1, 2021, pp. 172-179
Article Full Text PDF

20. Analysis of Rear-End Collision Accident of Urban Traffic Based on Safety Pre-warning Algorithm
Sizhuo Wang, Wei Li, and Chunyu Kong, Vol. 23, No. 1, 2021, pp. 180-185
Article Full Text PDF