Quick Search:

Volume: 23, No: 6 (November 1, 2021)

International Journal of Network Security

1. The Study on the Key Management and Billing for Wireless Sensor Networks
Eko Fajar Cahyadi, Cheng-Ying Yang, Nan-I Wu, and Min-Shiang Hwang, Vol. 23, No. 6, 2021, pp. 937-951
Article Full Text PDF

2. ID-Authentication Based on PTPM and Certificateless Public-Key Cryptography in Cloud
Hui Xia and Weiji Yang, Vol. 23, No. 6, 2021, pp. 952-961
Article Full Text PDF

3. High Security Speech BioHashing Authentication Algorithm Based on Multi-feature Fusion
Yi-Bo Huang, Hao Li, Yong Wang, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 962-972
Article Full Text PDF

4. Security Situation Assessment Algorithm for Industrial Control Network Nodes Based on Improved Text SimHash
Rui-Hong Dong, Chuang Shu, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 973-984
Article Full Text PDF

5. Intrusion Detection Model Based on Feature Selection and Random Forest
Rui-Hong Dong, Yong-Li Shui, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 985-996
Article Full Text PDF

6. An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
Hongquan Pu, Zhe Cui, and Ting Liu, Vol. 23, No. 6, 2021, pp. 997-1004
Article Full Text PDF

7. Elliptic Curve Scalar Multiplication Algorithm Based on Side Channel Atomic Block over GF(2^m)
Shuang-Gen Liu, Yan-Yan Hu, and Lan Wei, Vol. 23, No. 6, 2021, pp. 1005-1011
Article Full Text PDF

8. A Blockchain-based Revocable Certificateless Signature Scheme for IoT Device
Yushuang Chen, Dong Zheng, Rui Guo, Yinghui Zhang, and Xiaoling Tao, Vol. 23, No. 6, 2021, pp. 1012-1027
Article Full Text PDF

9. Robust Training for Injection Attacks Detection in Web-based Applications
Benjamin Appiah, Zhiguang~Qin, Owusu A. Kwabena, and Muhammed A. Abdullah, Vol. 23, No. 6, 2021, pp. 1028-1036
Article Full Text PDF

10. Access Control Model of Industrial Control System Based on Multi-attribute Decision Making
Rui-Hong Dong, Tong-Tong Xu, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 1037-1048
Article Full Text PDF

11. Location Privacy Protection Algorithm Based on PageRank and Differential Privacy in Internet of Vehicles
Peng-Shou Xie, Xin Wang, Hao-Xuan Yang, Liang-Xuan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1049-1057
Article Full Text PDF

12. Universal Signature Translators
Fei Tang, Dong Huang, Fuqun Wang, and Zhenyu Chen, Vol. 23, No. 6, 2021, pp. 1058-1064
Article Full Text PDF

13. Blockchain-based Trust Evaluation Mechanism for Internet of Vehicles Nodes
Peng-Shou Xie, Xi-Qiang Wang, Xiao-Jie Pan, Yi-Fan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1065-1073
Article Full Text PDF

14. A Note On One Privacy-Preserving Centralized Dynamic Spectrum Access System
Lihua Liu and Xinyuan Cao, Vol. 23, No. 6, 2021, pp. 1074-1077
Article Full Text PDF

15. Performance Evaluation Method of Location Privacy Protection Algorithm for Internet of Vehicles
Peng-Shou Xie, Xin-Yu Zhang, Xin Tong, Yi-Fan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1078-1086
Article Full Text PDF

16. An Improved Sequence Cross Transformation Method and Its Application in Image Encryption
Chunming Xu and Yong Zhang, Vol. 23, No. 6, 2021, pp. 1087-1092
Article Full Text PDF

17. Research on Multimedia Application on Information Hiding Forensics and Cybersecurity
Chin-Feng Lee, Chi-Yao Weng, Chih-Hung Wang, Goutam Chakraborty, Kouichi Sakurai, and Kuo-Yu Tsai, Vol. 23, No. 6, 2021, pp. 1093-1107
Article Full Text PDF

18. VoIP Packets Filtering for Mobile Instant Messaging Using N-gram Models
Cheng-Tan Tung and Chih-Ping Yen, Vol. 23, No. 6, 2021, pp. 1108-1117
Article Full Text PDF

19. Data Hiding Based on The Chinese Remainder Theorem
Chun-Cheng Wang, Tsung-Han Lin, and Wen-Chung Kuo, Vol. 23, No. 6, 2021, pp. 1118-1125
Article Full Text PDF

20. Retrieving Potential Cybersecurity Information from Hacker Forums
Chia-Mei Chen, Dan-Wei Wen, Ya-Hui Ou, Wei-Chih Chao, and Zheng-Xun Cai, Vol. 23, No. 6, 2021, pp. 1126-1138
Article Full Text PDF


23. Reviewer index to volume 23 (2021)
Article Full Text PDF