International Journal of Network Security | ||
1. | Research on Private and Seamless Roaming Cloud Service Authentications
|
|
Hsieh-Tsen Pan, Li-Chin Huang, and Min-Shiang Hwang, Vol. 23, No. 2, 2021, pp. 187-194 Article Full Text PDF |
||
2. | An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix
|
|
Jiang-Yi Lin, Yu Chen,Chin-Chen Chang, and Yu-Chen Hu, Vol. 23, No. 2, 2021, pp. 195-204 Article Full Text PDF |
||
3. | Revocable and Searchable Attribute-based Encryption Scheme with Multi-keyword and Verifiability for Internet of Things
|
|
Zhenhua Liu, Fangfang Yin, Jiaqi Ji, and Baocang Wang, Vol. 23, No. 2, 2021, pp. 205-219 Article Full Text PDF |
||
4. | A Pilot Study on Survivability of Networking Based on the Mobile Communication Agents
|
|
Awais Akram, Ren Jiadong, Tahir Rizwan, Muhammad Irshad, Sohail M. Noman, Jehangir Arshad, and Sana Ullah Badar, Vol. 23, No. 2, 2021, pp. 220-228 Article Full Text PDF |
||
5. | A Detection Method Based on Behavior-path Representation Against Application-layer DDoS Attacks
|
|
Yuntao Zhao, Wenjie Cui, and Yongxin Feng, Vol. 23, No. 2, 2021, pp. 229-237 Article Full Text PDF |
||
6. | A Novel Certificateless Aggregation Signcryption Scheme Under Internet of Things
|
|
Mingju Zhao and Yuping Peng, Vol. 23, No. 2, 2021, pp. 238-245 Article Full Text PDF |
||
7. | Security Analyses of Android APP on Ad Libs and Linked URLs
|
|
Ming-Yang Su, Sheng-Sheng Chen, Tsung-Ren Wu, Hao-Sen Chang, and You-Liang Liu, Vol. 23, No. 2, 2021, pp. 246-254 Article Full Text PDF |
||
8. | A Novel Chaotic Image Encryption Algorithm Based on Bit-level Permutation and Extended ZigZag Transform
|
|
Chunming Xu, Vol. 23, No. 2, 2021, pp. 255-260 Article Full Text PDF |
||
9. | An Identity Authentication Scheme of Energy Internet Based on Blockchain
|
|
Xiuxia Tian, Xi Chen, and Siqian Li, Vol. 23, No. 2, 2021, pp. 261-269 Article Full Text PDF |
||
10. | Enhanced Deduplication Protocol for Side Channel in Cloud Storages
|
|
Jie Ouyang, Huiran Zhang, Hongqing Hu, Xiao Wei, and Dongbo Dai, Vol. 23, No. 2, 2021, pp. 270-277 Article Full Text PDF |
||
11. | Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
|
|
Dan Zhu, Liwei Wang, and Hongfeng Zhu, Vol. 23, No. 2, 2021, pp. 278-285 Article Full Text PDF |
||
12. | Security Bound of Biclique Attacks on AES-128
|
|
Xiaoli Dong and Jie Che, Vol. 23, No. 2, 2021, pp. 286-295 Article Full Text PDF |
||
13. | Privacy-Preserving and Verifiable Electronic Voting Scheme Based on Smart Contract of Blockchain
|
|
Ting Liu, Zhe Cui, Hongjiang Du, and Zhihan Wu, Vol. 23, No. 2, 2021, pp. 296-304 Article Full Text PDF |
||
14. | Extension of PCL Theory and Its Application in Improved CCITT X.509 Analysis
|
|
Lei Yu, Zhi-Yao Yang, and Ze-Peng Zhuo, Vol. 23, No. 2, 2021, pp. 305-313 Article Full Text PDF |
||
15. | Personalized K-In&Out-Degree Anonymity Method for Large-scale Social Networks Based on Hierarchical Community Structure
|
|
XiaoLin Zhang, Jiao Liu, HongJing Bi, Jian Li, and YongPing Wang, Vol. 23, No. 2, 2021, pp. 314-325 Article Full Text PDF |
||
16. | Research on Crawling Network Information Data with Scrapy Framework
|
|
Dashan Wang, Qingbin Zhang, and Shaoxian Hong, Vol. 23, No. 2, 2021, pp. 326-331 Article Full Text PDF |
||
17. | Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme
|
|
Juan Ren, Leyou Zhang, and Baocang Wang, Vol. 23, No. 2, 2021, pp. 332-342 Article Full Text PDF |
||
18. | Public Key Infrastructure Traditional and Modern Implementation
|
|
Ohoud Albogami, Manal Alruqi, Kholood Almalki, and Asia Aljahdali, Vol. 23, No. 2, 2021, pp. 343-350 Article Full Text PDF |
||
19. | An Enhanced Differential Private Protection Method Based on Adaptive Iterative Wiener Filtering in Discrete Time Series
|
|
Dan Zheng, Lei Meng, Shoulin Yin, and Hang Li, Vol. 23, No. 2, 2021, pp. 351-358 Article Full Text PDF |
||
20. | Long Sequence Speech Perceptual Hash Authentication Algorithm Based on Multi-feature Fusion and Arnold Transform
|
|
Yi-Bo Huang, He-Xiang Hou, Man-Hong Fan, Wei-Zhao Zhang, and Qiu-Yu Zhang, Vol. 23, No. 2, 2021, pp. 359-370 Article Full Text PDF |
||