International Journal of Network Security | ||
1. | An Efficient Differential Privacy Method with Wavelet Transform for Edge Weights of Social Networks
|
|
Jun Yan, Hai Liu, and Zhenqiang Wu, Vol. 24, No. 2, 2022, pp. 181-192 Article Full Text PDF |
||
2. | Formal Security Evaluation and Improvement of BACnet/IP Protocol Based on HCPN Model
|
|
Tao Feng, Si-Meng Zhao, and Xiang Gong, Vol. 24, No. 2, 2022, pp. 193-205 Article Full Text PDF |
||
3. | General Certificate-based Key-Exposure Resilient Provable Data Possession without Certifier
|
|
Feng Wang, Li Xu, Zhide Chen, and Qikui Xu, Vol. 24, No. 2, 2022, pp. 206-215 Article Full Text PDF |
||
4. | JPEG Image Encryption Algorithm Based on Hyperchaotic, Mixed Hash and Dynamic DNA
|
|
Qiu-Yu Zhang and Yu-Tong Ye, Vol. 24, No. 2, 2022, pp. 216-229 Article Full Text PDF |
||
5. | Blockchain-based Privacy-Preserving Electronic Voting Protocol
|
|
Wenqiang Chai, Momeng Liu, Zeyu Zhang, and Liping Lv, Vol. 24, No. 2, 2022, pp. 230-237 Article Full Text PDF |
||
6. | Analysis of One Secure Key Agreement and Key Protection for Mobile Device User Authentication
|
|
Lihua Liu, Leming Hong, and Zhengjun Cao, Vol. 24, No. 2, 2022, pp. 238-242 Article Full Text PDF |
||
7. | Research on Robustness of Deep Neural Networks Based Data Preprocessing Techniques
|
|
Hong Zhao, You-kang Chang, and Wei-jie Wang, Vol. 24, No. 2, 2022, pp. 243-252 Article Full Text PDF |
||
8. | Network Traffic Feature Weight Map Based Approach for Intrusion Detection
|
|
Jianwu Zhang, Yu Zhang, Xingbing Fu, Yanjun An, Yuhang Yang, and Fagen Li, Vol. 24, No. 2, 2022, pp. 253-261 Article Full Text PDF |
||
9. | Integrity-Preserving and Eļ¬cient Policy Evaluation for XACML
|
|
Kai Zheng and Xiuxia Tian, Vol. 24, No. 2, 2022, pp. 262-272 Article Full Text PDF |
||
10. | Towards Forward Secure Conjunctive Searchable Symmetric Encryption with Result Pattern Hidden
|
|
Yunling Wang, Yichao Zhu, and Jianfeng Wang, Vol. 24, No. 2, 2022, pp. 273-285 Article Full Text PDF |
||
11. | Intrusion Detection Based on Feature Selection and Temporal Convolutional Network in Mobile Edge Computing Environment
|
|
Xubin Jiao, Jinguo Li, and Mi Wen, Vol. 24, No. 2, 2022, pp. 286-295 Article Full Text PDF |
||
12. | A Quantitative Assessment Method for Security Risk of IoV Based on Combination Weighting
|
|
Peng-Shou Xie, Liang-Xuan Wang, Shuai Wang, Ying-Wen Zhao, Tao Feng, and Yan Yan, Vol. 24, No. 2, 2022, pp. 296-304 Article Full Text PDF |
||
13. | Mobile RFID Authentication Protocol Based on Permutation Cross Synthesis for Anti Counterfeit Attack
|
|
Shan-Hua Zhan and Chun-Qiang Yu, Vol. 24, No. 2, 2022, pp. 305-313 Article Full Text PDF |
||
14. | Study on Network Video Image Encryption Based on an Optimized Algorithm Combined with High-Efficiency Video Coding
|
|
Wenwen Li, Hongfei Xiao, and Shiqi Tang, Vol. 24, No. 2, 2022, pp. 314-320 Article Full Text PDF |
||
15. | A Fusion Malicious Social Bots Detection Model Based on Static and Dynamic Features
|
|
Hongling Jiang, Dan Liu, Haiyan Kang, and Yilin Wang, Vol. 24, No. 2, 2022, pp. 321-332 Article Full Text PDF |
||
16. | Montgomery Algorithm Based on Co_Z Operation on Edwards Curves over Prime Field
|
|
Shuang-Gen Liu and Rong Lu, Vol. 24, No. 2, 2022, pp. 333-341 Article Full Text PDF |
||
17. | MIBFHE: Multi-identity Fully Homomorphic Encryption for Edge Data Sharing and Cooperative Computation
|
|
Jiawen Bao, Yan Zhang, Haiqing Liu, Yuancheng Li, and Rixuan Qiu, Vol. 24, No. 2, 2022, pp. 342-351 Article Full Text PDF |
||
18. | Formal Security Evaluation and Research of Automotive CAN Protocol Based on CPN
|
|
Tao Feng, Lu Zheng, and Peng-Shou Xie, Vol. 24, No. 2, 2022, pp. 352-363 Article Full Text PDF |
||
19. | Improving the Efficiency of Point Arithmetic on Elliptic Curves Using ARM Processors and NEON
|
|
Pham Van Luc, Hoang Dang Hai, and Leu Duc Tan, Vol. 24, No. 2, 2022, pp. 364-376 Article Full Text PDF |
||
20. | BioHashing Speech Security Retrieval Algorithm Based on MSCC and Improved Hadamard Measurement Matrix
|
|
Yi-Bo Huang, Yuan Zhang, and Qiu-Yu Zhang, Vol. 24, No. 2, 2022, pp. 377-387 Article Full Text PDF |
||