International Journal of Network Security | ||
1. | Research on Detection and Prevention of Mobile Device Botnet in Cloud Service Systems
|
|
Hung-Wei Yang, Li-Chin Huang, and Min-Shiang Hwang, Vol. 23, No. 3, 2021, pp. 371-378 Article Full Text PDF |
||
2. | NFC-Defender: SVM-based Attack Detection on NFC-enabled Mobile Device
|
|
Zhiqiang Wang, Wentao Wang, Jianyi Zhang, and Tao Yang, Vol. 23, No. 3, 2021, pp. 379-385 Article Full Text PDF |
||
3. | An Efficient Biometric Authenticated Protocol for Arbitrary-domain-server with Blockchain Technology
|
|
Hongfeng Zhu and Zexi Li, Vol. 23, No. 3, 2021, pp. 386-394 Article Full Text PDF |
||
4. | Double Circulant Self-Dual Codes From Generalized Cyclotomic Classes of Order Two
|
|
Wenpeng Gao and Tongjiang Yan, Vol. 23, No. 3, 2021, pp. 395-400 Article Full Text PDF |
||
5. | Compromised Accounts Detection Based on Information Entropy
|
|
Yanpeng Cui, Kun Wang, Jianwei Hu, Wei Zhao, Luming Feng, and Junjie Cui, Vol. 23, No. 3, 2021, pp. 401-411 Article Full Text PDF |
||
6. | Bound Estimation for Divisors of RSA Modulus with Small Divisor-ratio
|
|
Xingbo Wang, Vol. 23, No. 3, 2021, pp. 412-425 Article Full Text PDF |
||
7. | Analysis and Improvement of Otway-Rees based on Enhanced Authentication Tests
|
|
Lei Yu, Yu-Yan Guo, Ze-Peng Zhuo, and Shi-Min Wei, Vol. 23, No. 3, 2021, pp. 426-435 Article Full Text PDF |
||
8. | A Novel Privacy-preserving User Authentication Protocol for Big Data Environment
|
|
Jiabing Liu, Xudong He, Huoye Tang, Dejun Wang, and Bo Meng, Vol. 23, No. 3, 2021, pp. 436-448 Article Full Text PDF |
||
9. | On Security of Privacy-Preserving Remote User Authentication with k-Times Untraceability
|
|
Qijia Zhang, Jianhong Zhang, Linhan Liu, Jing Wang, and Pei Liu, Vol. 23, No. 3, 2021, pp. 449-454 Article Full Text PDF |
||
10. | The Linear Complexity of the Interleaved Polynomial Quotient Sequences
|
|
Chun-e Zhao, Tongjiang Yan, Xubo Zhao, and Qihua Niu, Vol. 23, No. 3, 2021, pp. 455-460 Article Full Text PDF |
||
11. | Expressive Ciphertext Policy Attribute-based Searchable Encryption for Medical Records in Cloud
|
|
Qing Wu, Xujin Ma, Leyou Zhang, and Yanru Chen, Vol. 23, No. 3, 2021, pp. 461-472 Article Full Text PDF |
||
12. | Integration of Quantization Watermarking and Amplitude-Thresholding Compression for Digital Audio Signal in the Wavelet Domain
|
|
Ming Zhao, Xindi Tong, and Jie Li, Vol. 23, No. 3, 2021, pp. 473-479 Article Full Text PDF |
||
13. | Digital Certificate of Public Key for User Authentication and Session Key Establishment for Secure Network Communications
|
|
Javad Saadatmandan and Amirhossein Rahimi, Vol. 23, No. 3, 2021, pp. 480-489 Article Full Text PDF |
||
14. | Research on Network Security Intrusion Detection System Based on Machine Learning
|
|
Yin Luo, Vol. 23, No. 3, 2021, pp. 490-495 Article Full Text PDF |
||
15. | Artificial Neural Network Model for Decrease Rank Attack Detection in RPL Based on Internet of Things Networks
|
|
Musa Osman, Jingsha He, Fawaz Mahiuob Mohammed Mokbal, and Nafei Zhu, Vol. 23, No. 3, 2021, pp. 496-503 Article Full Text PDF |
||
16. | RingCoin: An Accountable Mix for Achieving Bitcoin Anonymity
|
|
Albert Kofi Kwansah Ansah, Vol. 23, No. 3, 2021, pp. 504-514 Article Full Text PDF |
||
17. | Research on Network Security Risk Assessment Method Based on Improved Analytic Hierarchy Process
|
|
Gang Wang, Vol. 23, No. 3, 2021, pp. 515-521 Article Full Text PDF |
||
18. | S-PPOC: Multi-scheme Privacy-Preserving Outsourced Classification
|
|
Kwabena Owusu-Agyemeng, Zhen Qin,Hu Xiong,Tianming Zhuang, Liu Yao, and Zhiguang Qin, Vol. 23, No. 3, 2021, pp. 522-534 Article Full Text PDF |
||
19. | Blockchain Data Sharing Scheme Based on Searchable Agent Re-Encryption
|
|
Tao Feng, Hongmei Pei, Pengshoou Xie, and Xiaoqing Feng, Vol. 23, No. 3, 2021, pp. 535-544 Article Full Text PDF |
||
20. | Analysis of Shim's Attacks Against Some Certificateless Signature Schemes
|
|
Zhengjun Cao and Olivier Markowitch, Vol. 23, No. 3, 2021, pp. 545-548 Article Full Text PDF |
||