Quick Search:

Volume: 23, No: 3 (May 1, 2021)

International Journal of Network Security

1. Research on Detection and Prevention of Mobile Device Botnet in Cloud Service Systems
Hung-Wei Yang, Li-Chin Huang, and Min-Shiang Hwang, Vol. 23, No. 3, 2021, pp. 371-378
Article Full Text PDF

2. NFC-Defender: SVM-based Attack Detection on NFC-enabled Mobile Device
Zhiqiang Wang, Wentao Wang, Jianyi Zhang, and Tao Yang, Vol. 23, No. 3, 2021, pp. 379-385
Article Full Text PDF

3. An Efficient Biometric Authenticated Protocol for Arbitrary-domain-server with Blockchain Technology
Hongfeng Zhu and Zexi Li, Vol. 23, No. 3, 2021, pp. 386-394
Article Full Text PDF

4. Double Circulant Self-Dual Codes From Generalized Cyclotomic Classes of Order Two
Wenpeng Gao and Tongjiang Yan, Vol. 23, No. 3, 2021, pp. 395-400
Article Full Text PDF

5. Compromised Accounts Detection Based on Information Entropy
Yanpeng Cui, Kun Wang, Jianwei Hu, Wei Zhao, Luming Feng, and Junjie Cui, Vol. 23, No. 3, 2021, pp. 401-411
Article Full Text PDF

6. Bound Estimation for Divisors of RSA Modulus with Small Divisor-ratio
Xingbo Wang, Vol. 23, No. 3, 2021, pp. 412-425
Article Full Text PDF

7. Analysis and Improvement of Otway-Rees based on Enhanced Authentication Tests
Lei Yu, Yu-Yan Guo, Ze-Peng Zhuo, and Shi-Min Wei, Vol. 23, No. 3, 2021, pp. 426-435
Article Full Text PDF

8. A Novel Privacy-preserving User Authentication Protocol for Big Data Environment
Jiabing Liu, Xudong He, Huoye Tang, Dejun Wang, and Bo Meng, Vol. 23, No. 3, 2021, pp. 436-448
Article Full Text PDF

9. On Security of Privacy-Preserving Remote User Authentication with k-Times Untraceability
Qijia Zhang, Jianhong Zhang, Linhan Liu, Jing Wang, and Pei Liu, Vol. 23, No. 3, 2021, pp. 449-454
Article Full Text PDF

10. The Linear Complexity of the Interleaved Polynomial Quotient Sequences
Chun-e Zhao, Tongjiang Yan, Xubo Zhao, and Qihua Niu, Vol. 23, No. 3, 2021, pp. 455-460
Article Full Text PDF

11. Expressive Ciphertext Policy Attribute-based Searchable Encryption for Medical Records in Cloud
Qing Wu, Xujin Ma, Leyou Zhang, and Yanru Chen, Vol. 23, No. 3, 2021, pp. 461-472
Article Full Text PDF

12. Integration of Quantization Watermarking and Amplitude-Thresholding Compression for Digital Audio Signal in the Wavelet Domain
Ming Zhao, Xindi Tong, and Jie Li, Vol. 23, No. 3, 2021, pp. 473-479
Article Full Text PDF

13. Digital Certificate of Public Key for User Authentication and Session Key Establishment for Secure Network Communications
Javad Saadatmandan and Amirhossein Rahimi, Vol. 23, No. 3, 2021, pp. 480-489
Article Full Text PDF

14. Research on Network Security Intrusion Detection System Based on Machine Learning
Yin Luo, Vol. 23, No. 3, 2021, pp. 490-495
Article Full Text PDF

15. Artificial Neural Network Model for Decrease Rank Attack Detection in RPL Based on Internet of Things Networks
Musa Osman, Jingsha He, Fawaz Mahiuob Mohammed Mokbal, and Nafei Zhu, Vol. 23, No. 3, 2021, pp. 496-503
Article Full Text PDF

16. RingCoin: An Accountable Mix for Achieving Bitcoin Anonymity
Albert Kofi Kwansah Ansah, Vol. 23, No. 3, 2021, pp. 504-514
Article Full Text PDF

17. Research on Network Security Risk Assessment Method Based on Improved Analytic Hierarchy Process
Gang Wang, Vol. 23, No. 3, 2021, pp. 515-521
Article Full Text PDF

18. S-PPOC: Multi-scheme Privacy-Preserving Outsourced Classification
Kwabena Owusu-Agyemeng, Zhen Qin,Hu Xiong,Tianming Zhuang, Liu Yao, and Zhiguang Qin, Vol. 23, No. 3, 2021, pp. 522-534
Article Full Text PDF

19. Blockchain Data Sharing Scheme Based on Searchable Agent Re-Encryption
Tao Feng, Hongmei Pei, Pengshoou Xie, and Xiaoqing Feng, Vol. 23, No. 3, 2021, pp. 535-544
Article Full Text PDF

20. Analysis of Shim's Attacks Against Some Certificateless Signature Schemes
Zhengjun Cao and Olivier Markowitch, Vol. 23, No. 3, 2021, pp. 545-548
Article Full Text PDF