Quick Search:

Volume: 26, No: 1 (January 1, 2024)

International Journal of Network Security

1. Three-party Authentication Protocol Based on Riro for Mobile RFID System
Sheng-Hua Xu, Vol. 26, No. 1, 2024, pp. 1-9
Article Full Text PDF

2. Spatial Crowdsourcing Optimal Task Allocation Algorithm Based on Tree Decomposition
Hui Xia, Shufeng Zhang, and Weiji Yang, Vol. 26, No. 1, 2024, pp. 10-18
Article Full Text PDF

3. Research on the Detection of Illegal Transactions in Currency Transactions Based on Blockchain Technology
Shuang Wu, Quanzhi Liu, and Jie Li, Vol. 26, No. 1, 2024, pp. 19-24
Article Full Text PDF

4. Research on Education Information Security Sharing Based on Blockchain and Bayesian Network
Daihong Feng and Hang Li, Vol. 26, No. 1, 2024, pp. 25-32
Article Full Text PDF

5. CSDN: A Compressed Sensing Dynamic Network-based on Deep Learning for Nonlinear Scrambling Diffusion Synchronous English Image E
Qingxiang Duan, Vol. 26, No. 1, 2024, pp. 33-42
Article Full Text PDF

6. A Novel Four-dimensional Hyperchaotic System and DNA Encoding Method for Image Encryption
Jianjun Zhu and Jian'E Zhao, Vol. 26, No. 1, 2024, pp. 43-50
Article Full Text PDF

7. Attribute Network Representation Learning Based on Generative Adversarial Network and Self-attention Mechanism
Shanshan Li, Meiling Tang, and Yingnan Dong, Vol. 26, No. 1, 2024, pp. 51-58
Article Full Text PDF

8. Research on Security Deduplication of Civil Engineering Data Based on Integration Learning and Sequence Attention Mechanism Fusion
Xiaoli Zhao, and Xiaoyan Zheng, Vol. 26, No. 1, 2024, pp. 59-67
Article Full Text PDF

9. Research on Network Security Intrusion Detection Method Based on Optimization Algorithm and Neural Network
Jie Li and Jing Li, Vol. 26, No. 1, 2024, pp. 68-73
Article Full Text PDF

10. Privacy Preserving Scheme in Mobile Edge Crowdsensing Based on Federated Learning
Jian Chen, Linming Gong, Vol. 26, No. 1, 2024, pp. 74-83
Article Full Text PDF

11. Tag Ownership Transfer Protocol Based on Parity Check Patching Operation
Zhen-Hui Li, Vol. 26, No. 1, 2024, pp. 84-91
Article Full Text PDF

12. Research on Traffic Monitoring for Abnormal Intrusion in Campus Network under OpenFlow Network Structure
Yanlei Zhang, Vol. 26, No. 1, 2024, pp. 92-97
Article Full Text PDF

13. Lightweight RFID Bidirectional Authentication Protocol Based on Improved Hash Function
Fang-Ming Cao and Xiao-Ping He, Vol. 26, No. 1, 2024, pp. 98-105
Article Full Text PDF

14. An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
Wan-Rong Liu, Zhi-Yong Ji, and Cheng-Chen Chu, Vol. 26, No. 1, 2024, pp. 106-115
Article Full Text PDF

15. Parameter Obfuscation and Restoration for Secure Federated Learning Aggregation
Xiangxiang Ma, Linming Gong, Jian Chen, and Daoshun Wang, Vol. 26, No. 1, 2024, pp. 116-124
Article Full Text PDF

16. Differential Privacy Publishing of Location-based Statistical Data Based on Nonuniform Quadtree
Yan Yan, Yue Zhang, and Xingying Qian, Vol. 26, No. 1, 2024, pp. 125-137
Article Full Text PDF

17. Analysis of One Lightweight Authentication and Matrix-based Key Agreement Scheme for Healthcare in Fog Computing
Lihua Liu and Yingqing Jia, Vol. 26, No. 1, 2024, pp. 138-141
Article Full Text PDF

18. Research on Information Images in Digital Media Using an Improved Digital Watermarking Algorithm
Ying Sun, Guofeng Ma, and Shumei Zhao, Vol. 26, No. 1, 2024, pp. 142-148
Article Full Text PDF

19. Research on Resource Scheduling Strategy Based on Energy Consumption in Datacenter
Jianhua He and Dongli Wu, Vol. 26, No. 1, 2024, pp. 149-159
Article Full Text PDF

20. Research on Blockchain Secret Key Sharing and Its Digital Asset Applications
Chia-Chun Wu, Chun-Tse Chang, Iuon-Chang Lin, and Min-Shiang Hwang, Vol. 26, No. 1, 2024, pp. 160-166
Article Full Text PDF