International Journal of Network Security | ||
1. | Research on Security and Performance of Blockchain with Innovation Architecture Technology
|
|
Cheng-Ying Lin, Li-Chin Huang, Yi-Hui Chen, and Min-Shiang Hwang, Vol. 23, No. 1, 2021, pp. 1-8 Article Full Text PDF |
||
2. | ECID: Elliptic Curve Identity-based Blind Signature Scheme
|
|
Shoulin Yin, Hang Li, Shahid Karim, and Yang Sun, Vol. 23, No. 1, 2021, pp. 9-13 Article Full Text PDF |
||
3. | A Sensitive-Information Hiding Treatment in Quick-Response Codes Based on Error-Correcting Framework
|
|
Mingwu Zhang, Xiao Chen, Yong Ding, and Hua Shen, Vol. 23, No. 1, 2021, pp. 14-21 Article Full Text PDF |
||
4. | Information Aggregation Method of Intuitionistic Fuzzy Set Pair Analysis in Multi-Attribute Privacy Risk Decision-Making
|
|
Yan Yan, Bingqian Wang, Lianxiu Zhang, and Xin Gao, Vol. 23, No. 1, 2021, pp. 22-32 Article Full Text PDF |
||
5. | Design and Implementation of Random Number Generator System Based on Android Smartphone Sens
|
|
Yusuf Kurniawan and Mochamad Beta Auditama, Vol. 23, No. 1, 2021, pp. 33-41 Article Full Text PDF |
||
6. | Adaptive Fine-grained Access Control Method in Social Internet of Things
|
|
Hongbin Zhang, Pengcheng Ma, and Bin Liu, Vol. 23, No. 1, 2021, pp. 42-48 Article Full Text PDF |
||
7. | A P2P Anonymous Communication Scheme in IOT Based on Blockchain
|
|
Ye Lu, Vol. 23, No. 1, 2021, pp. 49-56 Article Full Text PDF |
||
8. | A k-Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution
|
|
Yong-Bing Zhang, Qiu-Yu Zhang, Yan Yan, Yi-Long Jiang, and Mo-Yi Zhang, Vol. 23, No. 1, 2021, pp. 57-66 Article Full Text PDF |
||
9. | Applying Permutations and Cuckoo Search for Obtaining a New Steganography Approach in Spatial Domain
|
|
Dieaa I. Nassr and Soheir M. Khamis, Vol. 23, No. 1, 2021, pp. 67-76 Article Full Text PDF |
||
10. | Detection and Prevention of Jellyfish Attacks Using kNN Algorithm and Trusted Routing Scheme in MANET
|
|
Zulfiqar Ali Zardari, Jingsha He, Muhammad Salman Pathan, Sirajuddin Qureshi, Muhammad Iftikhar Hussain, Fahad Razaque, Peng He, and Nafei Zhu, Vol. 23, No. 1, 2021, pp. 77-87 Article Full Text PDF |
||
11. | Detect Fast-Flux Domain Name with DGA through IP Fluctuation
|
|
Hongling Jiang and Jinzhi Lin, Vol. 23, No. 1, 2021, pp. 88-96 Article Full Text PDF |
||
12. | An Electronic Voting Scheme Based on LUC Secret System and Secret Sharing
|
|
Hongquan Pu, Zhe Cui, Ting Liu, Zhihan Wu, and Hongjiang Du, Vol. 23, No. 1, 2021, pp. 97-105 Article Full Text PDF |
||
13. | Intrusion Detection Method Based on MapReduce for Evolutionary Feature Selection in Mobile Cloud Computing
|
|
Emmanuel Mugabo, Qiu-Yu Zhang, Aristide Ngaboyindekwe, Vincent de Paul Niyigena Kwizera, and Victus Elikplim Lumorvie, Vol. 23, No. 1, 2021, pp. 106-115 Article Full Text PDF |
||
14. | Partitioned Group Password-based Authenticated Key Exchange with Privacy Protection
|
|
Hongfeng Zhu, Yuanle Zhang, Xueying Wang, and Liwei Wang, Vol. 23, No. 1, 2021, pp. 116-125 Article Full Text PDF |
||
15. | A Differentially Private K-means Clustering Scheme for Smart Grid
|
|
Shuai Guo, Mi Wen, and Xiaohui Liang, Vol. 23, No. 1, 2021, pp. 126-134 Article Full Text PDF |
||
16. | Additively Homomorphic IBE with Auxiliary Input for Big Data Security
|
|
Zhiwei Wang, Congcong Zhu, Nianhua Yang, and Zhanlin Wang, Vol. 23, No. 1, 2021, pp. 135-142 Article Full Text PDF |
||
17. | An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing
|
|
Ze Wang, Minghua Gao, Lu Chen, and Shimin Sun, Vol. 23, No. 1, 2021, pp. 143-156 Article Full Text PDF |
||
18. | A Lightweight User Authentication Scheme Based on Fuzzy Extraction Technology for Wireless Sensor Networks
|
|
Rui-Hong Dong, Bu-Bu Ren, Qiu-Yu Zhang, and Hui Yuan, Vol. 23, No. 1, 2021, pp. 157-171 Article Full Text PDF |
||
19. | Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts
|
|
Changchun Yan, Guoyou Zhang, Anhong Wang, Li Liu, and Chin-Chen Chang, Vol. 23, No. 1, 2021, pp. 172-179 Article Full Text PDF |
||
20. | Analysis of Rear-End Collision Accident of Urban Traffic Based on Safety Pre-warning Algorithm
|
|
Sizhuo Wang, Wei Li, and Chunyu Kong, Vol. 23, No. 1, 2021, pp. 180-185 Article Full Text PDF |
||