International Journal of Network Security | ||
1. | The Study on the Key Management and Billing for Wireless Sensor Networks
|
|
Eko Fajar Cahyadi, Cheng-Ying Yang, Nan-I Wu, and Min-Shiang Hwang, Vol. 23, No. 6, 2021, pp. 937-951 Article Full Text PDF |
||
2. | ID-Authentication Based on PTPM and Certificateless Public-Key Cryptography in Cloud
|
|
Hui Xia and Weiji Yang, Vol. 23, No. 6, 2021, pp. 952-961 Article Full Text PDF |
||
3. | High Security Speech BioHashing Authentication Algorithm Based on Multi-feature Fusion
|
|
Yi-Bo Huang, Hao Li, Yong Wang, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 962-972 Article Full Text PDF |
||
4. | Security Situation Assessment Algorithm for Industrial Control Network Nodes Based on Improved Text SimHash
|
|
Rui-Hong Dong, Chuang Shu, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 973-984 Article Full Text PDF |
||
5. | Intrusion Detection Model Based on Feature Selection and Random Forest
|
|
Rui-Hong Dong, Yong-Li Shui, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 985-996 Article Full Text PDF |
||
6. | An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
|
|
Hongquan Pu, Zhe Cui, and Ting Liu, Vol. 23, No. 6, 2021, pp. 997-1004 Article Full Text PDF |
||
7. | Elliptic Curve Scalar Multiplication Algorithm Based on Side Channel Atomic Block over GF(2^m)
|
|
Shuang-Gen Liu, Yan-Yan Hu, and Lan Wei, Vol. 23, No. 6, 2021, pp. 1005-1011 Article Full Text PDF |
||
8. | A Blockchain-based Revocable Certificateless Signature Scheme for IoT Device
|
|
Yushuang Chen, Dong Zheng, Rui Guo, Yinghui Zhang, and Xiaoling Tao, Vol. 23, No. 6, 2021, pp. 1012-1027 Article Full Text PDF |
||
9. | Robust Training for Injection Attacks Detection in Web-based Applications
|
|
Benjamin Appiah, Zhiguang~Qin, Owusu A. Kwabena, and Muhammed A. Abdullah, Vol. 23, No. 6, 2021, pp. 1028-1036 Article Full Text PDF |
||
10. | Access Control Model of Industrial Control System Based on Multi-attribute Decision Making
|
|
Rui-Hong Dong, Tong-Tong Xu, and Qiu-Yu Zhang, Vol. 23, No. 6, 2021, pp. 1037-1048 Article Full Text PDF |
||
11. | Location Privacy Protection Algorithm Based on PageRank and Differential Privacy in Internet of Vehicles
|
|
Peng-Shou Xie, Xin Wang, Hao-Xuan Yang, Liang-Xuan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1049-1057 Article Full Text PDF |
||
12. | Universal Signature Translators
|
|
Fei Tang, Dong Huang, Fuqun Wang, and Zhenyu Chen, Vol. 23, No. 6, 2021, pp. 1058-1064 Article Full Text PDF |
||
13. | Blockchain-based Trust Evaluation Mechanism for Internet of Vehicles Nodes
|
|
Peng-Shou Xie, Xi-Qiang Wang, Xiao-Jie Pan, Yi-Fan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1065-1073 Article Full Text PDF |
||
14. | A Note On One Privacy-Preserving Centralized Dynamic Spectrum Access System
|
|
Lihua Liu and Xinyuan Cao, Vol. 23, No. 6, 2021, pp. 1074-1077 Article Full Text PDF |
||
15. | Performance Evaluation Method of Location Privacy Protection Algorithm for Internet of Vehicles
|
|
Peng-Shou Xie, Xin-Yu Zhang, Xin Tong, Yi-Fan Wang, Tao Feng, and Yan Yan, Vol. 23, No. 6, 2021, pp. 1078-1086 Article Full Text PDF |
||
16. | An Improved Sequence Cross Transformation Method and Its Application in Image Encryption
|
|
Chunming Xu and Yong Zhang, Vol. 23, No. 6, 2021, pp. 1087-1092 Article Full Text PDF |
||
17. | Research on Multimedia Application on Information Hiding Forensics and Cybersecurity
|
|
Chin-Feng Lee, Chi-Yao Weng, Chih-Hung Wang, Goutam Chakraborty, Kouichi Sakurai, and Kuo-Yu Tsai, Vol. 23, No. 6, 2021, pp. 1093-1107 Article Full Text PDF |
||
18. | VoIP Packets Filtering for Mobile Instant Messaging Using N-gram Models
|
|
Cheng-Tan Tung and Chih-Ping Yen, Vol. 23, No. 6, 2021, pp. 1108-1117 Article Full Text PDF |
||
19. | Data Hiding Based on The Chinese Remainder Theorem
|
|
Chun-Cheng Wang, Tsung-Han Lin, and Wen-Chung Kuo, Vol. 23, No. 6, 2021, pp. 1118-1125 Article Full Text PDF |
||
20. | Retrieving Potential Cybersecurity Information from Hacker Forums
|
|
Chia-Mei Chen, Dan-Wei Wen, Ya-Hui Ou, Wei-Chih Chao, and Zheng-Xun Cai, Vol. 23, No. 6, 2021, pp. 1126-1138 Article Full Text PDF |
||
23. | Reviewer index to volume 23 (2021)
|
|
Article Full Text PDF | ||