| International Journal of Network Security | ||
| 1. | Research on Rough Set Theory for Mobile Fraud Detection
|
|
| Jinming Ma, Tianbing Xia, and Janusz Getta, Vol. 24, No. 5, 2022, pp. 777-786 Article Full Text PDF |
||
| 2. | A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
|
|
| Zhiyong Luo, Rui Xu, Jianming Wang, and Weicheng Zhu, Vol. 24, No. 5, 2022, pp. 787-796 Article Full Text PDF |
||
| 3. | A Note on Two Outsourcing Algorithms of Modular Exponentiations
|
|
| Xinlei Qi, Yunhai Zheng, and Chengliang Tian, Vol. 24, No. 5, 2022, pp. 797-801 Article Full Text PDF |
||
| 4. | AMC: A PoS Blockchain Consensus Protocol for Scalable Nodes
|
|
| Mengnan Wang, Yahui Jiang, Jianhua Huang, and Ruicong Tang, Vol. 24, No. 5, 2022, pp. 802-814 Article Full Text PDF |
||
| 5. | An Adaptive Multi-Layer Architecture for IoT based IDPS for Attacks using Deep Learning Method
|
|
| Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat, Vol. 24, No. 5, 2022, pp. 815-827 Article Full Text PDF |
||
| 6. | Distributed Dynamic Multicast Key Management Scheme Based on Grouped Linked List
|
|
| Liling Cao, Mei Liang, Yu Zhang, and Shouqi Cao, Vol. 24, No. 5, 2022, pp. 828-840 Article Full Text PDF |
||
| 7. | A Fully Secure Identity Based Encryption Scheme with Equality Test in The Standard Model in Cloud Computing
|
|
| Zijun Zhou, Yongjian Liao, Ganglin Zhang, Tingyun Gan, and Shijie Zhou, Vol. 24, No. 5, 2022, pp. 841-854 Article Full Text PDF |
||
| 8. | Speech Encryption Scheme Based on BFV Homomorphic Encryption
|
|
| Qiuyu Zhang, Yujiao Ba, Yingjie Hu, Zhenyu Zhao, and Yugui Jia, Vol. 24, No. 5, 2022, pp. 855-866 Article Full Text PDF |
||
| 9. | A Note on One Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
|
|
| Zhengjun Cao and Lihua Liu, Vol. 24, No. 5, 2022, pp. 867-871 Article Full Text PDF |
||
| 10. | Fine-grained Access Control Mechanism of Industrial Internet of Things Based on DAG Blockchain
|
|
| Fei Tang, Zhangtao Ye, Kung Dong, and Dong Huang, Vol. 24, No. 5, 2022, pp. 872-886 Article Full Text PDF |
||
| 11. | A Novel Color Image Encryption Algorithm Based on Fractional-Order Memristive Chaotic Circuit and DNA Coding Technology
|
|
| Fanqi Meng, Zuolei Wang, and Mingguang Shen, Vol. 24, No. 5, 2022, pp. 887-895 Article Full Text PDF |
||
| 12. | An Efficient Privacy-Preserving Data Aggregation Scheme without Trusted Authority in Smart Grid
|
|
| Xinyu Zhao, Jinguo Li, Na Zhao, and Ping Meng, Vol. 24, No. 5, 2022, pp. 896-903 Article Full Text PDF |
||
| 13. | An Efficient Heterogeneous Ring Signature Scheme
|
|
| Caixue Zhou, Vol. 24, No. 5, 2022, pp. 904-912 Article Full Text PDF |
||
| 14. | A Secure k-nearest Neighbor Query Processing Method Based on Extended Range of Cipher-Text Search
|
|
| Yong-Bing Zhang, Qiu-Yu Zhang, Yi-Long Jiang, and Jun Yang, Vol. 24, No. 5, 2022, pp. 913-921 Article Full Text PDF |
||
| 15. | Privacy Protection Scheme of POI Query Based on Semantic and Temporal Association
|
|
| Kaizhong Zuo, Jun Zhao, Peng Hu, Zhangyi Shen, and Xixi Chu, Vol. 24, No. 5, 2022, pp. 922-932 Article Full Text PDF |
||
| 16. | Perceptual Hash Secure Speech Authentication System Based on an Improved Chained DES in the Cloud Environment
|
|
| Yi-Bo Huang, Xiang-Rong Pu, and Qiu-Yu Zhang, Vol. 24, No. 5, 2022, pp. 933-946 Article Full Text PDF |
||
| 17. | Study on the Encryption and Decryption of a Hybrid Domestic Cryptographic Algorithm in Secure Transmission of Data Communication
|
|
| Yuqian Cheng, Vol. 24, No. 5, 2022, pp. 947-952 Article Full Text PDF |
||
| 18. | Performance Study of a Network Intrusion Detection Algorithm Improved by an Optimization Algorithm
|
|
| Wei Feng, Hanjun Gao, and Duan Cao, Vol. 24, No. 5, 2022, pp. 953-958 Article Full Text PDF |
||
| 19. | A Cryptographic Key Generation Scheme without a Trusted Third Party for Access Control in Multilevel Wireless Sensor Networks
|
|
| Yung-Chih Lu and Min-Shiang Hwang, Vol. 24, No. 5, 2022, pp. 959-964 Article Full Text PDF |
||
| 20. | An Erasure Code with Low Recovery-overhead Based on A Particular Three-hierarchical Redundancy Structure
|
|
| Zihao Wang, Zheng Xie, and Dan Tang, Vol. 24, No. 5, 2022, pp. 965-974 Article Full Text PDF |
||