Quick Search:

Volume: 24, No: 2 (March 1, 2022)

International Journal of Network Security

1. An Efficient Differential Privacy Method with Wavelet Transform for Edge Weights of Social Networks
Jun Yan, Hai Liu, and Zhenqiang Wu, Vol. 24, No. 2, 2022, pp. 181-192
Article Full Text PDF

2. Formal Security Evaluation and Improvement of BACnet/IP Protocol Based on HCPN Model
Tao Feng, Si-Meng Zhao, and Xiang Gong, Vol. 24, No. 2, 2022, pp. 193-205
Article Full Text PDF

3. General Certificate-based Key-Exposure Resilient Provable Data Possession without Certifier
Feng Wang, Li Xu, Zhide Chen, and Qikui Xu, Vol. 24, No. 2, 2022, pp. 206-215
Article Full Text PDF

4. JPEG Image Encryption Algorithm Based on Hyperchaotic, Mixed Hash and Dynamic DNA
Qiu-Yu Zhang and Yu-Tong Ye, Vol. 24, No. 2, 2022, pp. 216-229
Article Full Text PDF

5. Blockchain-based Privacy-Preserving Electronic Voting Protocol
Wenqiang Chai, Momeng Liu, Zeyu Zhang, and Liping Lv, Vol. 24, No. 2, 2022, pp. 230-237
Article Full Text PDF

6. Analysis of One Secure Key Agreement and Key Protection for Mobile Device User Authentication
Lihua Liu, Leming Hong, and Zhengjun Cao, Vol. 24, No. 2, 2022, pp. 238-242
Article Full Text PDF

7. Research on Robustness of Deep Neural Networks Based Data Preprocessing Techniques
Hong Zhao, You-kang Chang, and Wei-jie Wang, Vol. 24, No. 2, 2022, pp. 243-252
Article Full Text PDF

8. Network Traffic Feature Weight Map Based Approach for Intrusion Detection
Jianwu Zhang, Yu Zhang, Xingbing Fu, Yanjun An, Yuhang Yang, and Fagen Li, Vol. 24, No. 2, 2022, pp. 253-261
Article Full Text PDF

9. Integrity-Preserving and Eļ¬ƒcient Policy Evaluation for XACML
Kai Zheng and Xiuxia Tian, Vol. 24, No. 2, 2022, pp. 262-272
Article Full Text PDF

10. Towards Forward Secure Conjunctive Searchable Symmetric Encryption with Result Pattern Hidden
Yunling Wang, Yichao Zhu, and Jianfeng Wang, Vol. 24, No. 2, 2022, pp. 273-285
Article Full Text PDF

11. Intrusion Detection Based on Feature Selection and Temporal Convolutional Network in Mobile Edge Computing Environment
Xubin Jiao, Jinguo Li, and Mi Wen, Vol. 24, No. 2, 2022, pp. 286-295
Article Full Text PDF

12. A Quantitative Assessment Method for Security Risk of IoV Based on Combination Weighting
Peng-Shou Xie, Liang-Xuan Wang, Shuai Wang, Ying-Wen Zhao, Tao Feng, and Yan Yan, Vol. 24, No. 2, 2022, pp. 296-304
Article Full Text PDF

13. Mobile RFID Authentication Protocol Based on Permutation Cross Synthesis for Anti Counterfeit Attack
Shan-Hua Zhan and Chun-Qiang Yu, Vol. 24, No. 2, 2022, pp. 305-313
Article Full Text PDF

14. Study on Network Video Image Encryption Based on an Optimized Algorithm Combined with High-Efficiency Video Coding
Wenwen Li, Hongfei Xiao, and Shiqi Tang, Vol. 24, No. 2, 2022, pp. 314-320
Article Full Text PDF

15. A Fusion Malicious Social Bots Detection Model Based on Static and Dynamic Features
Hongling Jiang, Dan Liu, Haiyan Kang, and Yilin Wang, Vol. 24, No. 2, 2022, pp. 321-332
Article Full Text PDF

16. Montgomery Algorithm Based on Co_Z Operation on Edwards Curves over Prime Field
Shuang-Gen Liu and Rong Lu, Vol. 24, No. 2, 2022, pp. 333-341
Article Full Text PDF

17. MIBFHE: Multi-identity Fully Homomorphic Encryption for Edge Data Sharing and Cooperative Computation
Jiawen Bao, Yan Zhang, Haiqing Liu, Yuancheng Li, and Rixuan Qiu, Vol. 24, No. 2, 2022, pp. 342-351
Article Full Text PDF

18. Formal Security Evaluation and Research of Automotive CAN Protocol Based on CPN
Tao Feng, Lu Zheng, and Peng-Shou Xie, Vol. 24, No. 2, 2022, pp. 352-363
Article Full Text PDF

19. Improving the Efficiency of Point Arithmetic on Elliptic Curves Using ARM Processors and NEON
Pham Van Luc, Hoang Dang Hai, and Leu Duc Tan, Vol. 24, No. 2, 2022, pp. 364-376
Article Full Text PDF

20. BioHashing Speech Security Retrieval Algorithm Based on MSCC and Improved Hadamard Measurement Matrix
Yi-Bo Huang, Yuan Zhang, and Qiu-Yu Zhang, Vol. 24, No. 2, 2022, pp. 377-387
Article Full Text PDF