| International Journal of Network Security | ||
| 1. | Research on Detection and Prevention of Mobile Device Botnet in Cloud Service Systems
|
|
| Hung-Wei Yang, Li-Chin Huang, and Min-Shiang Hwang, Vol. 23, No. 3, 2021, pp. 371-378 Article Full Text PDF |
||
| 2. | NFC-Defender: SVM-based Attack Detection on NFC-enabled Mobile Device
|
|
| Zhiqiang Wang, Wentao Wang, Jianyi Zhang, and Tao Yang, Vol. 23, No. 3, 2021, pp. 379-385 Article Full Text PDF |
||
| 3. | An Efficient Biometric Authenticated Protocol for Arbitrary-domain-server with Blockchain Technology
|
|
| Hongfeng Zhu and Zexi Li, Vol. 23, No. 3, 2021, pp. 386-394 Article Full Text PDF |
||
| 4. | Double Circulant Self-Dual Codes From Generalized Cyclotomic Classes of Order Two
|
|
| Wenpeng Gao and Tongjiang Yan, Vol. 23, No. 3, 2021, pp. 395-400 Article Full Text PDF |
||
| 5. | Compromised Accounts Detection Based on Information Entropy
|
|
| Yanpeng Cui, Kun Wang, Jianwei Hu, Wei Zhao, Luming Feng, and Junjie Cui, Vol. 23, No. 3, 2021, pp. 401-411 Article Full Text PDF |
||
| 6. | Bound Estimation for Divisors of RSA Modulus with Small Divisor-ratio
|
|
| Xingbo Wang, Vol. 23, No. 3, 2021, pp. 412-425 Article Full Text PDF |
||
| 7. | Analysis and Improvement of Otway-Rees based on Enhanced Authentication Tests
|
|
| Lei Yu, Yu-Yan Guo, Ze-Peng Zhuo, and Shi-Min Wei, Vol. 23, No. 3, 2021, pp. 426-435 Article Full Text PDF |
||
| 8. | A Novel Privacy-preserving User Authentication Protocol for Big Data Environment
|
|
| Jiabing Liu, Xudong He, Huoye Tang, Dejun Wang, and Bo Meng, Vol. 23, No. 3, 2021, pp. 436-448 Article Full Text PDF |
||
| 9. | On Security of Privacy-Preserving Remote User Authentication with k-Times Untraceability
|
|
| Qijia Zhang, Jianhong Zhang, Linhan Liu, Jing Wang, and Pei Liu, Vol. 23, No. 3, 2021, pp. 449-454 Article Full Text PDF |
||
| 10. | The Linear Complexity of the Interleaved Polynomial Quotient Sequences
|
|
| Chun-e Zhao, Tongjiang Yan, Xubo Zhao, and Qihua Niu, Vol. 23, No. 3, 2021, pp. 455-460 Article Full Text PDF |
||
| 11. | Expressive Ciphertext Policy Attribute-based Searchable Encryption for Medical Records in Cloud
|
|
| Qing Wu, Xujin Ma, Leyou Zhang, and Yanru Chen, Vol. 23, No. 3, 2021, pp. 461-472 Article Full Text PDF |
||
| 12. | Integration of Quantization Watermarking and Amplitude-Thresholding Compression for Digital Audio Signal in the Wavelet Domain
|
|
| Ming Zhao, Xindi Tong, and Jie Li, Vol. 23, No. 3, 2021, pp. 473-479 Article Full Text PDF |
||
| 13. | Digital Certificate of Public Key for User Authentication and Session Key Establishment for Secure Network Communications
|
|
| Javad Saadatmandan and Amirhossein Rahimi, Vol. 23, No. 3, 2021, pp. 480-489 Article Full Text PDF |
||
| 14. | Research on Network Security Intrusion Detection System Based on Machine Learning
|
|
| Yin Luo, Vol. 23, No. 3, 2021, pp. 490-495 Article Full Text PDF |
||
| 15. | Artificial Neural Network Model for Decrease Rank Attack Detection in RPL Based on Internet of Things Networks
|
|
| Musa Osman, Jingsha He, Fawaz Mahiuob Mohammed Mokbal, and Nafei Zhu, Vol. 23, No. 3, 2021, pp. 496-503 Article Full Text PDF |
||
| 16. | RingCoin: An Accountable Mix for Achieving Bitcoin Anonymity
|
|
| Albert Kofi Kwansah Ansah, Vol. 23, No. 3, 2021, pp. 504-514 Article Full Text PDF |
||
| 17. | Research on Network Security Risk Assessment Method Based on Improved Analytic Hierarchy Process
|
|
| Gang Wang, Vol. 23, No. 3, 2021, pp. 515-521 Article Full Text PDF |
||
| 18. | S-PPOC: Multi-scheme Privacy-Preserving Outsourced Classification
|
|
| Kwabena Owusu-Agyemeng, Zhen Qin,Hu Xiong,Tianming Zhuang, Liu Yao, and Zhiguang Qin, Vol. 23, No. 3, 2021, pp. 522-534 Article Full Text PDF |
||
| 19. | Blockchain Data Sharing Scheme Based on Searchable Agent Re-Encryption
|
|
| Tao Feng, Hongmei Pei, Pengshoou Xie, and Xiaoqing Feng, Vol. 23, No. 3, 2021, pp. 535-544 Article Full Text PDF |
||
| 20. | Analysis of Shim's Attacks Against Some Certificateless Signature Schemes
|
|
| Zhengjun Cao and Olivier Markowitch, Vol. 23, No. 3, 2021, pp. 545-548 Article Full Text PDF |
||