Quick Search:

Volume: 23, No: 2 (March 1, 2021)

International Journal of Network Security

1. Research on Private and Seamless Roaming Cloud Service Authentications
Hsieh-Tsen Pan, Li-Chin Huang, and Min-Shiang Hwang, Vol. 23, No. 2, 2021, pp. 187-194
Article Full Text PDF

2. An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix
Jiang-Yi Lin, Yu Chen,Chin-Chen Chang, and Yu-Chen Hu, Vol. 23, No. 2, 2021, pp. 195-204
Article Full Text PDF

3. Revocable and Searchable Attribute-based Encryption Scheme with Multi-keyword and Verifiability for Internet of Things
Zhenhua Liu, Fangfang Yin, Jiaqi Ji, and Baocang Wang, Vol. 23, No. 2, 2021, pp. 205-219
Article Full Text PDF

4. A Pilot Study on Survivability of Networking Based on the Mobile Communication Agents
Awais Akram, Ren Jiadong, Tahir Rizwan, Muhammad Irshad, Sohail M. Noman, Jehangir Arshad, and Sana Ullah Badar, Vol. 23, No. 2, 2021, pp. 220-228
Article Full Text PDF

5. A Detection Method Based on Behavior-path Representation Against Application-layer DDoS Attacks
Yuntao Zhao, Wenjie Cui, and Yongxin Feng, Vol. 23, No. 2, 2021, pp. 229-237
Article Full Text PDF

6. A Novel Certificateless Aggregation Signcryption Scheme Under Internet of Things
Mingju Zhao and Yuping Peng, Vol. 23, No. 2, 2021, pp. 238-245
Article Full Text PDF

7. Security Analyses of Android APP on Ad Libs and Linked URLs
Ming-Yang Su, Sheng-Sheng Chen, Tsung-Ren Wu, Hao-Sen Chang, and You-Liang Liu, Vol. 23, No. 2, 2021, pp. 246-254
Article Full Text PDF

8. A Novel Chaotic Image Encryption Algorithm Based on Bit-level Permutation and Extended ZigZag Transform
Chunming Xu, Vol. 23, No. 2, 2021, pp. 255-260
Article Full Text PDF

9. An Identity Authentication Scheme of Energy Internet Based on Blockchain
Xiuxia Tian, Xi Chen, and Siqian Li, Vol. 23, No. 2, 2021, pp. 261-269
Article Full Text PDF

10. Enhanced Deduplication Protocol for Side Channel in Cloud Storages
Jie Ouyang, Huiran Zhang, Hongqing Hu, Xiao Wei, and Dongbo Dai, Vol. 23, No. 2, 2021, pp. 270-277
Article Full Text PDF

11. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
Dan Zhu, Liwei Wang, and Hongfeng Zhu, Vol. 23, No. 2, 2021, pp. 278-285
Article Full Text PDF

12. Security Bound of Biclique Attacks on AES-128
Xiaoli Dong and Jie Che, Vol. 23, No. 2, 2021, pp. 286-295
Article Full Text PDF

13. Privacy-Preserving and Verifiable Electronic Voting Scheme Based on Smart Contract of Blockchain
Ting Liu, Zhe Cui, Hongjiang Du, and Zhihan Wu, Vol. 23, No. 2, 2021, pp. 296-304
Article Full Text PDF

14. Extension of PCL Theory and Its Application in Improved CCITT X.509 Analysis
Lei Yu, Zhi-Yao Yang, and Ze-Peng Zhuo, Vol. 23, No. 2, 2021, pp. 305-313
Article Full Text PDF

15. Personalized K-In&Out-Degree Anonymity Method for Large-scale Social Networks Based on Hierarchical Community Structure
XiaoLin Zhang, Jiao Liu, HongJing Bi, Jian Li, and YongPing Wang, Vol. 23, No. 2, 2021, pp. 314-325
Article Full Text PDF

16. Research on Crawling Network Information Data with Scrapy Framework
Dashan Wang, Qingbin Zhang, and Shaoxian Hong, Vol. 23, No. 2, 2021, pp. 326-331
Article Full Text PDF

17. Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme
Juan Ren, Leyou Zhang, and Baocang Wang, Vol. 23, No. 2, 2021, pp. 332-342
Article Full Text PDF

18. Public Key Infrastructure Traditional and Modern Implementation
Ohoud Albogami, Manal Alruqi, Kholood Almalki, and Asia Aljahdali, Vol. 23, No. 2, 2021, pp. 343-350
Article Full Text PDF

19. An Enhanced Differential Private Protection Method Based on Adaptive Iterative Wiener Filtering in Discrete Time Series
Dan Zheng, Lei Meng, Shoulin Yin, and Hang Li, Vol. 23, No. 2, 2021, pp. 351-358
Article Full Text PDF

20. Long Sequence Speech Perceptual Hash Authentication Algorithm Based on Multi-feature Fusion and Arnold Transform
Yi-Bo Huang, He-Xiang Hou, Man-Hong Fan, Wei-Zhao Zhang, and Qiu-Yu Zhang, Vol. 23, No. 2, 2021, pp. 359-370
Article Full Text PDF