International Journal of Network Security | ||
1. | Research on Rough Set Theory for Mobile Fraud Detection
|
|
Jinming Ma, Tianbing Xia, and Janusz Getta, Vol. 24, No. 5, 2022, pp. 777-786 Article Full Text PDF |
||
2. | A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
|
|
Zhiyong Luo, Rui Xu, Jianming Wang, and Weicheng Zhu, Vol. 24, No. 5, 2022, pp. 787-796 Article Full Text PDF |
||
3. | A Note on Two Outsourcing Algorithms of Modular Exponentiations
|
|
Xinlei Qi, Yunhai Zheng, and Chengliang Tian, Vol. 24, No. 5, 2022, pp. 797-801 Article Full Text PDF |
||
4. | AMC: A PoS Blockchain Consensus Protocol for Scalable Nodes
|
|
Mengnan Wang, Yahui Jiang, Jianhua Huang, and Ruicong Tang, Vol. 24, No. 5, 2022, pp. 802-814 Article Full Text PDF |
||
5. | An Adaptive Multi-Layer Architecture for IoT based IDPS for Attacks using Deep Learning Method
|
|
Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 24, No. 5, 2022, pp. 815-827 Article Full Text PDF |
||
6. | Distributed Dynamic Multicast Key Management Scheme Based on Grouped Linked List
|
|
Liling Cao, Mei Liang, Yu Zhang, and Shouqi Cao, Vol. 24, No. 5, 2022, pp. 828-840 Article Full Text PDF |
||
7. | A Fully Secure Identity Based Encryption Scheme with Equality Test in The Standard Model in Cloud Computing
|
|
Zijun Zhou, Yongjian Liao, Ganglin Zhang, Tingyun Gan, and Shijie Zhou, Vol. 24, No. 5, 2022, pp. 841-854 Article Full Text PDF |
||
8. | Speech Encryption Scheme Based on BFV Homomorphic Encryption
|
|
Qiuyu Zhang, Yujiao Ba, Yingjie Hu, Zhenyu Zhao, and Yugui Jia, Vol. 24, No. 5, 2022, pp. 855-866 Article Full Text PDF |
||
9. | A Note on One Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
|
|
Zhengjun Cao and Lihua Liu, Vol. 24, No. 5, 2022, pp. 867-871 Article Full Text PDF |
||
10. | Fine-grained Access Control Mechanism of Industrial Internet of Things Based on DAG Blockchain
|
|
Fei Tang, Zhangtao Ye, Kung Dong, and Dong Huang, Vol. 24, No. 5, 2022, pp. 872-886 Article Full Text PDF |
||
11. | A Novel Color Image Encryption Algorithm Based on Fractional-Order Memristive Chaotic Circuit and DNA Coding Technology
|
|
Fanqi Meng, Zuolei Wang, and Mingguang Shen, Vol. 24, No. 5, 2022, pp. 887-895 Article Full Text PDF |
||
12. | An Efficient Privacy-Preserving Data Aggregation Scheme without Trusted Authority in Smart Grid
|
|
Xinyu Zhao, Jinguo Li, Na Zhao, and Ping Meng, Vol. 24, No. 5, 2022, pp. 896-903 Article Full Text PDF |
||
13. | An Efficient Heterogeneous Ring Signature Scheme
|
|
Caixue Zhou, Vol. 24, No. 5, 2022, pp. 904-912 Article Full Text PDF |
||
14. | A Secure k-nearest Neighbor Query Processing Method Based on Extended Range of Cipher-Text Search
|
|
Yong-Bing Zhang, Qiu-Yu Zhang, Yi-Long Jiang, and Jun Yang, Vol. 24, No. 5, 2022, pp. 913-921 Article Full Text PDF |
||
15. | Privacy Protection Scheme of POI Query Based on Semantic and Temporal Association
|
|
Kaizhong Zuo, Jun Zhao, Peng Hu, Zhangyi Shen, and Xixi Chu, Vol. 24, No. 5, 2022, pp. 922-932 Article Full Text PDF |
||
16. | Perceptual Hash Secure Speech Authentication System Based on an Improved Chained DES in the Cloud Environment
|
|
Yi-Bo Huang, Xiang-Rong Pu, and Qiu-Yu Zhang, Vol. 24, No. 5, 2022, pp. 933-946 Article Full Text PDF |
||
17. | Study on the Encryption and Decryption of a Hybrid Domestic Cryptographic Algorithm in Secure Transmission of Data Communication
|
|
Yuqian Cheng, Vol. 24, No. 5, 2022, pp. 947-952 Article Full Text PDF |
||
18. | Performance Study of a Network Intrusion Detection Algorithm Improved by an Optimization Algorithm
|
|
Wei Feng, Hanjun Gao, and Duan Cao, Vol. 24, No. 5, 2022, pp. 953-958 Article Full Text PDF |
||
19. | A Cryptographic Key Generation Scheme without a Trusted Third Party for Access Control in Multilevel Wireless Sensor Networks
|
|
Yung-Chih Lu and Min-Shiang Hwang, Vol. 24, No. 5, 2022, pp. 959-964 Article Full Text PDF |
||
20. | An Erasure Code with Low Recovery-overhead Based on A Particular Three-hierarchical Redundancy Structure
|
|
Zihao Wang, Zheng Xie, and Dan Tang, Vol. 24, No. 5, 2022, pp. 965-974 Article Full Text PDF |
||