International Journal of Network Security  
1.  Research on Detection and Prevention of Mobile Device Botnet in Cloud Service Systems


HungWei Yang, LiChin Huang, and MinShiang Hwang, Vol. 23, No. 3, 2021, pp. 371378 Article Full Text PDF 

2.  NFCDefender: SVMbased Attack Detection on NFCenabled Mobile Device


Zhiqiang Wang, Wentao Wang, Jianyi Zhang, and Tao Yang, Vol. 23, No. 3, 2021, pp. 379385 Article Full Text PDF 

3.  An Efficient Biometric Authenticated Protocol for Arbitrarydomainserver with Blockchain Technology


Hongfeng Zhu and Zexi Li, Vol. 23, No. 3, 2021, pp. 386394 Article Full Text PDF 

4.  Double Circulant SelfDual Codes From Generalized Cyclotomic Classes of Order Two


Wenpeng Gao and Tongjiang Yan, Vol. 23, No. 3, 2021, pp. 395400 Article Full Text PDF 

5.  Compromised Accounts Detection Based on Information Entropy


Yanpeng Cui, Kun Wang, Jianwei Hu, Wei Zhao, Luming Feng, and Junjie Cui, Vol. 23, No. 3, 2021, pp. 401411 Article Full Text PDF 

6.  Bound Estimation for Divisors of RSA Modulus with Small Divisorratio


Xingbo Wang, Vol. 23, No. 3, 2021, pp. 412425 Article Full Text PDF 

7.  Analysis and Improvement of OtwayRees based on Enhanced Authentication Tests


Lei Yu, YuYan Guo, ZePeng Zhuo, and ShiMin Wei, Vol. 23, No. 3, 2021, pp. 426435 Article Full Text PDF 

8.  A Novel Privacypreserving User Authentication Protocol for Big Data Environment


Jiabing Liu, Xudong He, Huoye Tang, Dejun Wang, and Bo Meng, Vol. 23, No. 3, 2021, pp. 436448 Article Full Text PDF 

9.  On Security of PrivacyPreserving Remote User Authentication with kTimes Untraceability


Qijia Zhang, Jianhong Zhang, Linhan Liu, Jing Wang, and Pei Liu, Vol. 23, No. 3, 2021, pp. 449454 Article Full Text PDF 

10.  The Linear Complexity of the Interleaved Polynomial Quotient Sequences


Chune Zhao, Tongjiang Yan, Xubo Zhao, and Qihua Niu, Vol. 23, No. 3, 2021, pp. 455460 Article Full Text PDF 

11.  Expressive Ciphertext Policy Attributebased Searchable Encryption for Medical Records in Cloud


Qing Wu, Xujin Ma, Leyou Zhang, and Yanru Chen, Vol. 23, No. 3, 2021, pp. 461472 Article Full Text PDF 

12.  Integration of Quantization Watermarking and AmplitudeThresholding Compression for Digital Audio Signal in the Wavelet Domain


Ming Zhao, Xindi Tong, and Jie Li, Vol. 23, No. 3, 2021, pp. 473479 Article Full Text PDF 

13.  Digital Certificate of Public Key for User Authentication and Session Key Establishment for Secure Network Communications


Javad Saadatmandan and Amirhossein Rahimi, Vol. 23, No. 3, 2021, pp. 480489 Article Full Text PDF 

14.  Research on Network Security Intrusion Detection System Based on Machine Learning


Yin Luo, Vol. 23, No. 3, 2021, pp. 490495 Article Full Text PDF 

15.  Artificial Neural Network Model for Decrease Rank Attack Detection in RPL Based on Internet of Things Networks


Musa Osman, Jingsha He, Fawaz Mahiuob Mohammed Mokbal, and Nafei Zhu, Vol. 23, No. 3, 2021, pp. 496503 Article Full Text PDF 

16.  RingCoin: An Accountable Mix for Achieving Bitcoin Anonymity


Albert Kofi Kwansah Ansah, Vol. 23, No. 3, 2021, pp. 504514 Article Full Text PDF 

17.  Research on Network Security Risk Assessment Method Based on Improved Analytic Hierarchy Process


Gang Wang, Vol. 23, No. 3, 2021, pp. 515521 Article Full Text PDF 

18.  SPPOC: Multischeme PrivacyPreserving Outsourced Classification


Kwabena OwusuAgyemeng, Zhen Qin,Hu Xiong,Tianming Zhuang, Liu Yao, and Zhiguang Qin, Vol. 23, No. 3, 2021, pp. 522534 Article Full Text PDF 

19.  Blockchain Data Sharing Scheme Based on Searchable Agent ReEncryption


Tao Feng, Hongmei Pei, Pengshoou Xie, and Xiaoqing Feng, Vol. 23, No. 3, 2021, pp. 535544 Article Full Text PDF 

20.  Analysis of Shim's Attacks Against Some Certificateless Signature Schemes


Zhengjun Cao and Olivier Markowitch, Vol. 23, No. 3, 2021, pp. 545548 Article Full Text PDF 
