International Journal of Network Security | ||
1. | Three-party Authentication Protocol Based on Riro for Mobile RFID System
|
|
Sheng-Hua Xu, Vol. 26, No. 1, 2024, pp. 1-9 Article Full Text PDF |
||
2. | Spatial Crowdsourcing Optimal Task Allocation Algorithm Based on Tree Decomposition
|
|
Hui Xia, Shufeng Zhang, and Weiji Yang, Vol. 26, No. 1, 2024, pp. 10-18 Article Full Text PDF |
||
3. | Research on the Detection of Illegal Transactions in Currency Transactions Based on Blockchain Technology
|
|
Shuang Wu, Quanzhi Liu, and Jie Li, Vol. 26, No. 1, 2024, pp. 19-24 Article Full Text PDF |
||
4. | Research on Education Information Security Sharing Based on Blockchain and Bayesian Network
|
|
Daihong Feng and Hang Li, Vol. 26, No. 1, 2024, pp. 25-32 Article Full Text PDF |
||
5. | CSDN: A Compressed Sensing Dynamic Network-based on Deep Learning for Nonlinear Scrambling Diffusion Synchronous English Image E
|
|
Qingxiang Duan, Vol. 26, No. 1, 2024, pp. 33-42 Article Full Text PDF |
||
6. | A Novel Four-dimensional Hyperchaotic System and DNA Encoding Method for Image Encryption
|
|
Jianjun Zhu and Jian'E Zhao, Vol. 26, No. 1, 2024, pp. 43-50 Article Full Text PDF |
||
7. | Attribute Network Representation Learning Based on Generative Adversarial Network and Self-attention Mechanism
|
|
Shanshan Li, Meiling Tang, and Yingnan Dong, Vol. 26, No. 1, 2024, pp. 51-58 Article Full Text PDF |
||
8. | Research on Security Deduplication of Civil Engineering Data Based on Integration Learning and Sequence Attention Mechanism Fusion
|
|
Xiaoli Zhao, and Xiaoyan Zheng, Vol. 26, No. 1, 2024, pp. 59-67 Article Full Text PDF |
||
9. | Research on Network Security Intrusion Detection Method Based on Optimization Algorithm and Neural Network
|
|
Jie Li and Jing Li, Vol. 26, No. 1, 2024, pp. 68-73 Article Full Text PDF |
||
10. | Privacy Preserving Scheme in Mobile Edge Crowdsensing Based on Federated Learning
|
|
Jian Chen, Linming Gong, Vol. 26, No. 1, 2024, pp. 74-83 Article Full Text PDF |
||
11. | Tag Ownership Transfer Protocol Based on Parity Check Patching Operation
|
|
Zhen-Hui Li, Vol. 26, No. 1, 2024, pp. 84-91 Article Full Text PDF |
||
12. | Research on Traffic Monitoring for Abnormal Intrusion in Campus Network under OpenFlow Network Structure
|
|
Yanlei Zhang, Vol. 26, No. 1, 2024, pp. 92-97 Article Full Text PDF |
||
13. | Lightweight RFID Bidirectional Authentication Protocol Based on Improved Hash Function
|
|
Fang-Ming Cao and Xiao-Ping He, Vol. 26, No. 1, 2024, pp. 98-105 Article Full Text PDF |
||
14. | An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
|
|
Wan-Rong Liu, Zhi-Yong Ji, and Cheng-Chen Chu, Vol. 26, No. 1, 2024, pp. 106-115 Article Full Text PDF |
||
15. | Parameter Obfuscation and Restoration for Secure Federated Learning Aggregation
|
|
Xiangxiang Ma, Linming Gong, Jian Chen, and Daoshun Wang, Vol. 26, No. 1, 2024, pp. 116-124 Article Full Text PDF |
||
16. | Differential Privacy Publishing of Location-based Statistical Data Based on Nonuniform Quadtree
|
|
Yan Yan, Yue Zhang, and Xingying Qian, Vol. 26, No. 1, 2024, pp. 125-137 Article Full Text PDF |
||
17. | Analysis of One Lightweight Authentication and Matrix-based Key Agreement Scheme for Healthcare in Fog Computing
|
|
Lihua Liu and Yingqing Jia, Vol. 26, No. 1, 2024, pp. 138-141 Article Full Text PDF |
||
18. | Research on Information Images in Digital Media Using an Improved Digital Watermarking Algorithm
|
|
Ying Sun, Guofeng Ma, and Shumei Zhao, Vol. 26, No. 1, 2024, pp. 142-148 Article Full Text PDF |
||
19. | Research on Resource Scheduling Strategy Based on Energy Consumption in Datacenter
|
|
Jianhua He and Dongli Wu, Vol. 26, No. 1, 2024, pp. 149-159 Article Full Text PDF |
||
20. | Research on Blockchain Secret Key Sharing and Its Digital Asset Applications
|
|
Chia-Chun Wu, Chun-Tse Chang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 26, No. 1, 2024, pp. 160-166 Article Full Text PDF |
||