Quick Search:

Paper Preview:

International Journal of Network Security

1. Extension of PCL Theory and Its Application in Improved CCITT X.509 Analysis
Lei Yu, Zhi-Yao Yang, and Ze-Peng Zhuo
Article Full Text PDF

2. Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
Dan Zhu, Liwei Wang, and Hongfeng Zhu
Article Full Text PDF

3. Privacy-Preserving and Verifiable Electronic Voting Scheme Based on Smart Contract of Blockchain
Ting Liu, Zhe Cui, Hongjiang Du, and Zhihan Wu
Article Full Text PDF

4. An Identity Authentication Scheme of Energy Internet Based on Blockchain
Xiuxia Tian, Xi Chen, and Siqian Li
Article Full Text PDF

5. Enhanced Deduplication Protocol for Side Channel in Cloud Storages
Jie Ouyang, Huiran Zhang, Hongqing Hu, Xiao Wei, and Dongbo Dai
Article Full Text PDF

6. Security Bound of Biclique Attacks on AES-128
Xiaoli Dong and Jie Che
Article Full Text PDF

7. Visible 3D-model Watermarking Algorithm for 3D-Printing Based on Bitmap Fonts
Changchun Yan, Guoyou Zhang, Anhong Wang, Li Liu, and Chin-Chen Chang
Article Full Text PDF

8. Personalized K-In&Out-Degree Anonymity Method for Large-scale Social Networks Based on Hierarchical Community Structure
XiaoLin Zhang, Jiao Liu, HongJing Bi, Jian Li, and YongPing Wang
Article Full Text PDF

9. An Efficient Lossless Dual Images Secret Sharing Scheme Using Turtle Shell Reference Matrix
Jiang-Yi Lin, Yu Chen,Chin-Chen Chang, and Yu-Chen Hu
Article Full Text PDF