Quick Search:

Volume: 23, No: 5 (September 1, 2021)

International Journal of Network Security

1. Research on E-book Text Copyright Protection and Anti-tampering Technology
Yung-Chen Chou, Kurnia Anggriani, Nan-I Wu, and Min-Shiang Hwang, Vol. 23, No. 5, 2021, pp. 739-749
Article Full Text PDF

2. Efficient and Secure Elliptic Curve Scalar Multiplication Based on Quadruple-and-Add
Shuang-Gen Liu, Si-Jia An, and Yi-Wei Du, Vol. 23, No. 5, 2021, pp. 750-757
Article Full Text PDF

3. Exploitation of The Distributed Network Protocol in ICS with Improved D-Y Model Based on Petri Net
Ye Lu, Vol. 23, No. 5, 2021, pp. 758-768
Article Full Text PDF

4. Identification and Detection of Network Intrusion Data Using the Deep Learning Method
Yonghe Zeng, Vol. 23, No. 5, 2021, pp. 769-775
Article Full Text PDF

5. Efficient Identity-based Proxy Re-encryption Scheme in Blockchain-assisted Decentralized Storage System
Jiayu He, Dong Zheng, Rui Guo, Yushuang Chen, Kemeng Li, and Xiaoling Tao, Vol. 23, No. 5, 2021, pp. 776-790
Article Full Text PDF

6. A Coercion-Resistant E-Voting System Based on Blockchain Technology
Kaili Ye, Dong Zheng, Rui Guo, Jiayu He, Yushuang Chen, and Xiaoling Tao, Vol. 23, No. 5, 2021, pp. 791-806
Article Full Text PDF

7. Research on Privacy Security Risk Evaluation of Mobile Commerce Users Based on Information Entropy and Markov Theory
Ming Yang, Li Jia, Tilei Gao, Tao Zhang, and Wanyu Xie, Vol. 23, No. 5, 2021, pp. 807-816
Article Full Text PDF

8. Mining Frequent Sequential Patterns with Local Differential Privacy
Huihua Xia, Wenchao Huang, Yan Xiong, and Fuyou Miao, Vol. 23, No. 5, 2021, pp. 817-829
Article Full Text PDF

9. Research on Detection and Defense of Malicious Code Under Network Security
Xiaoli Xiong and Yongguang Hou, Vol. 23, No. 5, 2021, pp. 830-834
Article Full Text PDF

10. Malicious Atack Pevention Model of Internet of Vehicles Based on IOV-SIRS
Peng-shou Xie, Cheng Fu, Xin Wang, Tao Feng, and Yan Yan, Vol. 23, No. 5, 2021, pp. 835-844
Article Full Text PDF

11. Role-Engineering Optimization with User-Oriented Cardinality Constraints in Role-Based Access Control
Wei Sun, Xiaoya Yuan, and Hui Su, Vol. 23, No. 5, 2021, pp. 845-855
Article Full Text PDF

12. An Improved FH-CP-ABE Scheme with Flexible Attribute Management and Efficient User Decryption
Junliang Zhang and Weiyou Zhang, Vol. 23, No. 5, 2021, pp. 856-866
Article Full Text PDF

13. A Blind Signature-based Location Privacy Protection Scheme for Mobile Social Networks
Xin Xu, Mi Wen, and Liangliang Wang, Vol. 23, No. 5, 2021, pp. 867-877
Article Full Text PDF

14. Comments on A Remote User Authentication Scheme for Multi-server 5G Networks
Jiaqing Mo and Zhongwang Hu, Vol. 23, No. 5, 2021, pp. 878-882
Article Full Text PDF

15. An Independent Variable Swinging Coupled Chaotic System for a Pseudorandom Bit Generator
Qi Wu, Vol. 23, No. 5, 2021, pp. 883-887
Article Full Text PDF

16. A New Fast Matching Method for Dummy K-anonymous Location Privacy Protection in Location Based Services
Xiaohui Zhu and Renlong Qi, Vol. 23, No. 5, 2021, pp. 888-894
Article Full Text PDF

17. Security Analysis and Enhancements of a User Authentication Scheme
Wan-Rong Liu, Xin He, and Zhi-Yong Ji, Vol. 23, No. 5, 2021, pp. 895-903
Article Full Text PDF

18. An Improved Certificateless Signature Scheme for IoT-based Mobile Payment
Fen Yan, Linggen Xing, and Zhenchao Zhang, Vol. 23, No. 5, 2021, pp. 904-913
Article Full Text PDF

19. Fast Scalar Multiplication Algorithm Based on Co_Z Operation and Conjugate Point Addition
Shuang-Gen Liu, Ying Zhang, and Shi-Yao Chen, Vol. 23, No. 5, 2021, pp. 914-923
Article Full Text PDF

20. A Hyperchaotic Encrypted Speech Perceptual Hashing Retrieval Algorithm Based on 2D-Gabor Transform
Yi-bo Huang, Shi-hong Wang, Yong Wang, Yuan Zhang, and Qiu-yu Zhang, Vol. 23, No. 5, 2021, pp. 924-935
Article Full Text PDF