Quick Search:

Volume: 24, No: 5 (September 1, 2022)

International Journal of Network Security

1. Research on Rough Set Theory for Mobile Fraud Detection
Jinming Ma, Tianbing Xia, and Janusz Getta, Vol. 24, No. 5, 2022, pp. 777-786
Article Full Text PDF

2. A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
Zhiyong Luo, Rui Xu, Jianming Wang, and Weicheng Zhu, Vol. 24, No. 5, 2022, pp. 787-796
Article Full Text PDF

3. A Note on Two Outsourcing Algorithms of Modular Exponentiations
Xinlei Qi, Yunhai Zheng, and Chengliang Tian, Vol. 24, No. 5, 2022, pp. 797-801
Article Full Text PDF

4. AMC: A PoS Blockchain Consensus Protocol for Scalable Nodes
Mengnan Wang, Yahui Jiang, Jianhua Huang, and Ruicong Tang, Vol. 24, No. 5, 2022, pp. 802-814
Article Full Text PDF

5. An Adaptive Multi-Layer Architecture for IoT based IDPS for Attacks using Deep Learning Method
Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 24, No. 5, 2022, pp. 815-827
Article Full Text PDF

6. Distributed Dynamic Multicast Key Management Scheme Based on Grouped Linked List
Liling Cao, Mei Liang, Yu Zhang, and Shouqi Cao, Vol. 24, No. 5, 2022, pp. 828-840
Article Full Text PDF

7. A Fully Secure Identity Based Encryption Scheme with Equality Test in The Standard Model in Cloud Computing
Zijun Zhou, Yongjian Liao, Ganglin Zhang, Tingyun Gan, and Shijie Zhou, Vol. 24, No. 5, 2022, pp. 841-854
Article Full Text PDF

8. Speech Encryption Scheme Based on BFV Homomorphic Encryption
Qiuyu Zhang, Yujiao Ba, Yingjie Hu, Zhenyu Zhao, and Yugui Jia, Vol. 24, No. 5, 2022, pp. 855-866
Article Full Text PDF

9. A Note on One Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
Zhengjun Cao and Lihua Liu, Vol. 24, No. 5, 2022, pp. 867-871
Article Full Text PDF

10. Fine-grained Access Control Mechanism of Industrial Internet of Things Based on DAG Blockchain
Fei Tang, Zhangtao Ye, Kung Dong, and Dong Huang, Vol. 24, No. 5, 2022, pp. 872-886
Article Full Text PDF

11. A Novel Color Image Encryption Algorithm Based on Fractional-Order Memristive Chaotic Circuit and DNA Coding Technology
Fanqi Meng, Zuolei Wang, and Mingguang Shen, Vol. 24, No. 5, 2022, pp. 887-895
Article Full Text PDF

12. An Efficient Privacy-Preserving Data Aggregation Scheme without Trusted Authority in Smart Grid
Xinyu Zhao, Jinguo Li, Na Zhao, and Ping Meng, Vol. 24, No. 5, 2022, pp. 896-903
Article Full Text PDF

13. An Efficient Heterogeneous Ring Signature Scheme
Caixue Zhou, Vol. 24, No. 5, 2022, pp. 904-912
Article Full Text PDF

14. A Secure k-nearest Neighbor Query Processing Method Based on Extended Range of Cipher-Text Search
Yong-Bing Zhang, Qiu-Yu Zhang, Yi-Long Jiang, and Jun Yang, Vol. 24, No. 5, 2022, pp. 913-921
Article Full Text PDF

15. Privacy Protection Scheme of POI Query Based on Semantic and Temporal Association
Kaizhong Zuo, Jun Zhao, Peng Hu, Zhangyi Shen, and Xixi Chu, Vol. 24, No. 5, 2022, pp. 922-932
Article Full Text PDF

16. Perceptual Hash Secure Speech Authentication System Based on an Improved Chained DES in the Cloud Environment
Yi-Bo Huang, Xiang-Rong Pu, and Qiu-Yu Zhang, Vol. 24, No. 5, 2022, pp. 933-946
Article Full Text PDF

17. Study on the Encryption and Decryption of a Hybrid Domestic Cryptographic Algorithm in Secure Transmission of Data Communication
Yuqian Cheng, Vol. 24, No. 5, 2022, pp. 947-952
Article Full Text PDF

18. Performance Study of a Network Intrusion Detection Algorithm Improved by an Optimization Algorithm
Wei Feng, Hanjun Gao, and Duan Cao, Vol. 24, No. 5, 2022, pp. 953-958
Article Full Text PDF

19. A Cryptographic Key Generation Scheme without a Trusted Third Party for Access Control in Multilevel Wireless Sensor Networks
Yung-Chih Lu and Min-Shiang Hwang, Vol. 24, No. 5, 2022, pp. 959-964
Article Full Text PDF

20. An Erasure Code with Low Recovery-overhead Based on A Particular Three-hierarchical Redundancy Structure
Zihao Wang, Zheng Xie, and Dan Tang, Vol. 24, No. 5, 2022, pp. 965-974
Article Full Text PDF