| International Journal of Network Security | ||
| 1. | The Study on the Key Management and Billing for Wireless Sensor Networks
|
|
| Eko Fajar Cahyadi, Cheng-Ying Yang, Nan-I Wu, and Min-Shiang Hwang, Vol. 23, No. 6, 2021, pp. 937-951 Article Full Text PDF |
||
| 2. | ID-Authentication Based on PTPM and Certificateless Public-Key Cryptography in Cloud
|
|
| Hui Xia and Weiji Yang, Vol. 23, No. 6, 2021, pp. 952-961 Article Full Text PDF |
||
| 3. | High Security Speech BioHashing Authentication Algorithm Based on Multi-feature Fusion
|
|
| Yi-Bo Huang, Hao Li, Yong Wang, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 962-972 Article Full Text PDF |
||
| 4. | Security Situation Assessment Algorithm for Industrial Control Network Nodes Based on Improved Text SimHash
|
|
| Rui-Hong Dong, Chuang Shu, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 973-984 Article Full Text PDF |
||
| 5. | Intrusion Detection Model Based on Feature Selection and Random Forest
|
|
| Rui-Hong Dong, Yong-Li Shui, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 985-996 Article Full Text PDF |
||
| 6. | An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
|
|
| Hongquan Pu, Zhe Cui, and Ting Liu, Vol. 23, No. 6, 2021, pp. 997-1004 Article Full Text PDF |
||
| 7. | Elliptic Curve Scalar Multiplication Algorithm Based on Side Channel Atomic Block over GF(2^m)
|
|
| Shuang-Gen Liu, Yan-Yan Hu, and Lan Wei, Vol. 23, No. 6, 2021, pp. 1005-1011 Article Full Text PDF |
||
| 8. | A Blockchain-based Revocable Certificateless Signature Scheme for IoT Device
|
|
| Yushuang Chen, Dong Zheng, Rui Guo, Yinghui Zhang, and Xiaoling Tao, Vol. 23, No. 6, 2021, pp. 1012-1027 Article Full Text PDF |
||
| 9. | Robust Training for Injection Attacks Detection in Web-based Applications
|
|
| Benjamin Appiah, Zhiguang~Qin, Owusu A. Kwabena, and Muhammed A. Abdullah, Vol. 23, No. 6, 2021, pp. 1028-1036 Article Full Text PDF |
||
| 10. | Access Control Model of Industrial Control System Based on Multi-attribute Decision Making
|
|
| Rui-Hong Dong, Tong-Tong Xu, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 1037-1048 Article Full Text PDF |
||
| 11. | Location Privacy Protection Algorithm Based on PageRank and Differential Privacy in Internet of Vehicles
|
|
| Peng-Shou Xie, Xin Wang, Hao-Xuan Yang, Liang-Xuan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1049-1057 Article Full Text PDF |
||
| 12. | Universal Signature Translators
|
|
| Fei Tang, Dong Huang, Fuqun Wang, and Zhenyu Chen, Vol. 23, No. 6, 2021, pp. 1058-1064 Article Full Text PDF |
||
| 13. | Blockchain-based Trust Evaluation Mechanism for Internet of Vehicles Nodes
|
|
| Peng-Shou Xie, Xi-Qiang Wang, Xiao-Jie Pan, Yi-Fan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1065-1073 Article Full Text PDF |
||
| 14. | A Note On One Privacy-Preserving Centralized Dynamic Spectrum Access System
|
|
| Lihua Liu and Xinyuan Cao, Vol. 23, No. 6, 2021, pp. 1074-1077 Article Full Text PDF |
||
| 15. | Performance Evaluation Method of Location Privacy Protection Algorithm for Internet of Vehicles
|
|
| Peng-Shou Xie, Xin-Yu Zhang, Xin Tong, Yi-Fan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1078-1086 Article Full Text PDF |
||
| 16. | An Improved Sequence Cross Transformation Method and Its Application in Image Encryption
|
|
| Chunming Xu and Yong Zhang, Vol. 23, No. 6, 2021, pp. 1087-1092 Article Full Text PDF |
||
| 17. | Research on Multimedia Application on Information Hiding Forensics and Cybersecurity
|
|
| Chin-Feng Lee, Chi-Yao Weng, Chih-Hung Wang, Goutam Chakraborty, Kouichi Sakurai, and Kuo-Yu Tsai, Vol. 23, No. 6, 2021, pp. 1093-1107 Article Full Text PDF |
||
| 18. | VoIP Packets Filtering for Mobile Instant Messaging Using N-gram Models
|
|
| Cheng-Tan Tung and Chih-Ping Yen, Vol. 23, No. 6, 2021, pp. 1108-1117 Article Full Text PDF |
||
| 19. | Data Hiding Based on The Chinese Remainder Theorem
|
|
| Chun-Cheng Wang, Tsung-Han Lin, and Wen-Chung Kuo, Vol. 23, No. 6, 2021, pp. 1118-1125 Article Full Text PDF |
||
| 20. | Retrieving Potential Cybersecurity Information from Hacker Forums
|
|
| Chia-Mei Chen, Dan-Wei Wen, Ya-Hui Ou, Wei-Chih Chao, and Zheng-Xun Cai, Vol. 23, No. 6, 2021, pp. 1126-1138 Article Full Text PDF |
||
| 23. | Reviewer index to volume 23 (2021)
|
|
| Article Full Text PDF | ||