| International Journal of Network Security | ||
| 1. | Research on E-book Text Copyright Protection and Anti-tampering Technology
|
|
| Yung-Chen Chou, Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 23, No. 5, 2021, pp. 739-749 Article Full Text PDF |
||
| 2. | Efficient and Secure Elliptic Curve Scalar Multiplication Based on Quadruple-and-Add
|
|
| Shuang-Gen Liu, Si-Jia An, and Yi-Wei Du, Vol. 23, No. 5, 2021, pp. 750-757 Article Full Text PDF |
||
| 3. | Exploitation of The Distributed Network Protocol in ICS with Improved D-Y Model Based on Petri Net
|
|
| Ye Lu, Vol. 23, No. 5, 2021, pp. 758-768 Article Full Text PDF |
||
| 4. | Identification and Detection of Network Intrusion Data Using the Deep Learning Method
|
|
| Yonghe Zeng, Vol. 23, No. 5, 2021, pp. 769-775 Article Full Text PDF |
||
| 5. | Efficient Identity-based Proxy Re-encryption Scheme in Blockchain-assisted Decentralized Storage System
|
|
| Jiayu He, Dong Zheng, Rui Guo, Yushuang Chen, Kemeng Li, and Xiaoling Tao, Vol. 23, No. 5, 2021, pp. 776-790 Article Full Text PDF |
||
| 6. | A Coercion-Resistant E-Voting System Based on Blockchain Technology
|
|
| Kaili Ye, Dong Zheng, Rui Guo, Jiayu He, Yushuang Chen, and Xiaoling Tao, Vol. 23, No. 5, 2021, pp. 791-806 Article Full Text PDF |
||
| 7. | Research on Privacy Security Risk Evaluation of Mobile Commerce Users Based on Information Entropy and Markov Theory
|
|
| Ming Yang, Li Jia, Tilei Gao, Tao Zhang, and Wanyu Xie, Vol. 23, No. 5, 2021, pp. 807-816 Article Full Text PDF |
||
| 8. | Mining Frequent Sequential Patterns with Local Differential Privacy
|
|
| Huihua Xia, Wenchao Huang, Yan Xiong, and Fuyou Miao, Vol. 23, No. 5, 2021, pp. 817-829 Article Full Text PDF |
||
| 9. | Research on Detection and Defense of Malicious Code Under Network Security
|
|
| Xiaoli Xiong and Yongguang Hou, Vol. 23, No. 5, 2021, pp. 830-834 Article Full Text PDF |
||
| 10. | Malicious Atack Pevention Model of Internet of Vehicles Based on IOV-SIRS
|
|
| Peng-shou Xie, Cheng Fu, Xin Wang, Tao Feng, and Yan Yan, Vol. 23, No. 5, 2021, pp. 835-844 Article Full Text PDF |
||
| 11. | Role-Engineering Optimization with User-Oriented Cardinality Constraints in Role-Based Access Control
|
|
| Wei Sun, Xiaoya Yuan, and Hui Su, Vol. 23, No. 5, 2021, pp. 845-855 Article Full Text PDF |
||
| 12. | An Improved FH-CP-ABE Scheme with Flexible Attribute Management and Efficient User Decryption
|
|
| Junliang Zhang and Weiyou Zhang, Vol. 23, No. 5, 2021, pp. 856-866 Article Full Text PDF |
||
| 13. | A Blind Signature-based Location Privacy Protection Scheme for Mobile Social Networks
|
|
| Xin Xu, Mi Wen, and Liangliang Wang, Vol. 23, No. 5, 2021, pp. 867-877 Article Full Text PDF |
||
| 14. | Comments on A Remote User Authentication Scheme for Multi-server 5G Networks
|
|
| Jiaqing Mo and Zhongwang Hu, Vol. 23, No. 5, 2021, pp. 878-882 Article Full Text PDF |
||
| 15. | An Independent Variable Swinging Coupled Chaotic System for a Pseudorandom Bit Generator
|
|
| Qi Wu, Vol. 23, No. 5, 2021, pp. 883-887 Article Full Text PDF |
||
| 16. | A New Fast Matching Method for Dummy K-anonymous Location Privacy Protection in Location Based Services
|
|
| Xiaohui Zhu and Renlong Qi, Vol. 23, No. 5, 2021, pp. 888-894 Article Full Text PDF |
||
| 17. | Security Analysis and Enhancements of a User Authentication Scheme
|
|
| Wan-Rong Liu, Xin He, and Zhi-Yong Ji, Vol. 23, No. 5, 2021, pp. 895-903 Article Full Text PDF |
||
| 18. | An Improved Certificateless Signature Scheme for IoT-based Mobile Payment
|
|
| Fen Yan, Linggen Xing, and Zhenchao Zhang, Vol. 23, No. 5, 2021, pp. 904-913 Article Full Text PDF |
||
| 19. | Fast Scalar Multiplication Algorithm Based on Co_Z Operation and Conjugate Point Addition
|
|
| Shuang-Gen Liu, Ying Zhang, and Shi-Yao Chen, Vol. 23, No. 5, 2021, pp. 914-923 Article Full Text PDF |
||
| 20. | A Hyperchaotic Encrypted Speech Perceptual Hashing Retrieval Algorithm Based on 2D-Gabor Transform
|
|
| Yi-bo Huang, Shi-hong Wang, Yong Wang, Yuan Zhang, and Qiu-yu Zhang, Vol. 23, No. 5, 2021, pp. 924-935 Article Full Text PDF |
||