International Journal of Network Security | ||
1. | Artificial Neural Network Model for Decrease Rank Attack Detection in RPL Based on Internet of Things Networks
|
|
Musa Osman, Jingsha He, Fawaz Mahiuob Mohammed Mokbal, and Nafei Zhu Article Full Text PDF |
||
2. | Blockchain Data Sharing Scheme Based on Searchable Agent Re-Encryption
|
|
Tao Feng, Hongmei Pei, Pengshoou Xie, and Xiaoqing Feng Article Full Text PDF |
||
3. | Decentralizing Multi-Authority Attribute-Based Access Control Scheme with Fully Hidden Policy
|
|
Leyou Zhang, Juan Ren, Li Kang, and Baocang Wang Article Full Text PDF |
||
4. | Fast Scalar Multiplication Algorithms Based on 5P+Q of Elliptic Curve over GF(3^m)
|
|
Shuang-Gen Liu, Xiang Wang, Yao-Wei Liu, and Dong-Juan Li Article Full Text PDF |
||
5. | Large-Scale Social Network Privacy Protection Method for Protecting K-Core
|
|
Jian Li, Xiaolin Zhang, Jiao Liu, Lu Gao, Huanxiang Zhang, and Yueyang Feng Article Full Text PDF |
||
6. | Research on Dynamic Social Network Anonymity Technology for Protecting Community Structure
|
|
Na Li, Xiao-Lin Zhang, Yong-Ping Wang, Jian Li, and Li-Xin Liu Article Full Text PDF |
||
7. | RingCoin: An Accountable Mix for Achieving Bitcoin Anonymity
|
|
Albert Kofi Kwansah Ansah Article Full Text PDF |
||
8. | Analysis and Improvement of Otway-Rees based on Enhanced Authentication Tests
|
|
Lei Yu, Yu-Yan Guo, Ze-Peng Zhuo, and Shi-Min Wei Article Full Text PDF |
||
9. | S-PPOC: Multi-scheme Privacy-Preserving Outsourced Classification
|
|
Kwabena Owusu-Agyemeng, Zhen Qin,Hu Xiong,Tianming Zhuang, Liu Yao, and Zhiguang Qin Article Full Text PDF |
||