International Journal of Network Security | ||
1. | Research on E-book Text Copyright Protection and Anti-tampering Technology
|
|
Yung-Chen Chou, Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 23, No. 5, 2021, pp. 739-749 Article Full Text PDF |
||
2. | Efficient and Secure Elliptic Curve Scalar Multiplication Based on Quadruple-and-Add
|
|
Shuang-Gen Liu, Si-Jia An, and Yi-Wei Du, Vol. 23, No. 5, 2021, pp. 750-757 Article Full Text PDF |
||
3. | Exploitation of The Distributed Network Protocol in ICS with Improved D-Y Model Based on Petri Net
|
|
Ye Lu, Vol. 23, No. 5, 2021, pp. 758-768 Article Full Text PDF |
||
4. | Identification and Detection of Network Intrusion Data Using the Deep Learning Method
|
|
Yonghe Zeng, Vol. 23, No. 5, 2021, pp. 769-775 Article Full Text PDF |
||
5. | Efficient Identity-based Proxy Re-encryption Scheme in Blockchain-assisted Decentralized Storage System
|
|
Jiayu He, Dong Zheng, Rui Guo, Yushuang Chen, Kemeng Li, and Xiaoling Tao, Vol. 23, No. 5, 2021, pp. 776-790 Article Full Text PDF |
||
6. | A Coercion-Resistant E-Voting System Based on Blockchain Technology
|
|
Kaili Ye, Dong Zheng, Rui Guo, Jiayu He, Yushuang Chen, and Xiaoling Tao, Vol. 23, No. 5, 2021, pp. 791-806 Article Full Text PDF |
||
7. | Research on Privacy Security Risk Evaluation of Mobile Commerce Users Based on Information Entropy and Markov Theory
|
|
Ming Yang, Li Jia, Tilei Gao, Tao Zhang, and Wanyu Xie, Vol. 23, No. 5, 2021, pp. 807-816 Article Full Text PDF |
||
8. | Mining Frequent Sequential Patterns with Local Differential Privacy
|
|
Huihua Xia, Wenchao Huang, Yan Xiong, and Fuyou Miao, Vol. 23, No. 5, 2021, pp. 817-829 Article Full Text PDF |
||
9. | Research on Detection and Defense of Malicious Code Under Network Security
|
|
Xiaoli Xiong and Yongguang Hou, Vol. 23, No. 5, 2021, pp. 830-834 Article Full Text PDF |
||
10. | Malicious Atack Pevention Model of Internet of Vehicles Based on IOV-SIRS
|
|
Peng-shou Xie, Cheng Fu, Xin Wang, Tao Feng, and Yan Yan, Vol. 23, No. 5, 2021, pp. 835-844 Article Full Text PDF |
||
11. | Role-Engineering Optimization with User-Oriented Cardinality Constraints in Role-Based Access Control
|
|
Wei Sun, Xiaoya Yuan, and Hui Su, Vol. 23, No. 5, 2021, pp. 845-855 Article Full Text PDF |
||
12. | An Improved FH-CP-ABE Scheme with Flexible Attribute Management and Efficient User Decryption
|
|
Junliang Zhang and Weiyou Zhang, Vol. 23, No. 5, 2021, pp. 856-866 Article Full Text PDF |
||
13. | A Blind Signature-based Location Privacy Protection Scheme for Mobile Social Networks
|
|
Xin Xu, Mi Wen, and Liangliang Wang, Vol. 23, No. 5, 2021, pp. 867-877 Article Full Text PDF |
||
14. | Comments on A Remote User Authentication Scheme for Multi-server 5G Networks
|
|
Jiaqing Mo and Zhongwang Hu, Vol. 23, No. 5, 2021, pp. 878-882 Article Full Text PDF |
||
15. | An Independent Variable Swinging Coupled Chaotic System for a Pseudorandom Bit Generator
|
|
Qi Wu, Vol. 23, No. 5, 2021, pp. 883-887 Article Full Text PDF |
||
16. | A New Fast Matching Method for Dummy K-anonymous Location Privacy Protection in Location Based Services
|
|
Xiaohui Zhu and Renlong Qi, Vol. 23, No. 5, 2021, pp. 888-894 Article Full Text PDF |
||
17. | Security Analysis and Enhancements of a User Authentication Scheme
|
|
Wan-Rong Liu, Xin He, and Zhi-Yong Ji, Vol. 23, No. 5, 2021, pp. 895-903 Article Full Text PDF |
||
18. | An Improved Certificateless Signature Scheme for IoT-based Mobile Payment
|
|
Fen Yan, Linggen Xing, and Zhenchao Zhang, Vol. 23, No. 5, 2021, pp. 904-913 Article Full Text PDF |
||
19. | Fast Scalar Multiplication Algorithm Based on Co_Z Operation and Conjugate Point Addition
|
|
Shuang-Gen Liu, Ying Zhang, and Shi-Yao Chen, Vol. 23, No. 5, 2021, pp. 914-923 Article Full Text PDF |
||
20. | A Hyperchaotic Encrypted Speech Perceptual Hashing Retrieval Algorithm Based on 2D-Gabor Transform
|
|
Yi-bo Huang, Shi-hong Wang, Yong Wang, Yuan Zhang, and Qiu-yu Zhang, Vol. 23, No. 5, 2021, pp. 924-935 Article Full Text PDF |
||