International Journal of Network Security | ||
1. | A Study on Cypher Assignment Based on Secrecy Capacity
|
|
Cheng-Ying Yang, Jong-Shin Chen, Jenq-Foung JF Yao, and Min-Shiang Hwang, Vol. 26, No. 2, 2024, pp. 167-172 Article Full Text PDF |
||
2. | Research on Blockchain Technology for Security Protection of Network Information Data in the Legal System Background
|
|
Dongdong Li, Vol. 26, No. 2, 2024, pp. 173-179 Article Full Text PDF |
||
3. | Design and Research of Off-line Transaction Protocols in Remote Areas Under Smart Contracts
|
|
Jian Zhou, Shi-Hua Huang, and Shi Yan, Vol. 26, No. 2, 2024, pp. 180-189 Article Full Text PDF |
||
4. | A Lightweight Authentication Protocol for Mobile RFID
|
|
Tao Pan, Kai-Zhong Zuo, Tao-Chun Wang, and Chun-Hong Deng, Vol. 26, No. 2, 2024, pp. 190-199 Article Full Text PDF |
||
5. | Research on the Protection of Personal Sensitive Information and Privacy Data on the Internet Under Legal Regulations
|
|
Xiaodan Li, Vol. 26, No. 2, 2024, pp. 200-205 Article Full Text PDF |
||
6. | An Erasure Code with Low Repair-Cost Based on A Combined-stripe Encoding Structure
|
|
Minjun Sun, Dan Tang, Yue Li, Xie Wang, Hongliang Cai, and Qiong Zeng, Vol. 26, No. 2, 2024, pp. 206-216 Article Full Text PDF |
||
7. | Network Security Situational Awareness of Enterprise Control Systems under Machine Learning
|
|
Hui You, Vol. 26, No. 2, 2024, pp. 217-223 Article Full Text PDF |
||
8. | Transform Sequential Data to Image for Detecting Covert Timing Channel
|
|
Xuwen Huang, Yonghong Chen, Xiaolong Zhuang, and Yuwei Lin, Vol. 26, No. 2, 2024, pp. 224-234 Article Full Text PDF |
||
9. | Transformer-based Image Super-Resolution Defense Against Adversarial Attacks
|
|
Zi-Han Liu, Vol. 26, No. 2, 2024, pp. 235-243 Article Full Text PDF |
||
10. | Color Image Encryption Algorithm with ZigZag Transform and DNA Coding Based on Fractional Order 5D Hyperchaotic System
|
|
Fanqi Meng and Gang Wu, Vol. 26, No. 2, 2024, pp. 244-251 Article Full Text PDF |
||
11. | A Note on One Lightweight Authenticated Key Agreement for Fog-enabled IoT Deployment
|
|
Lihua Liu, Yingqing Jia, and Zhengjun Cao, Vol. 26, No. 2, 2024, pp. 252-256 Article Full Text PDF |
||
12. | Design and Implementation of a Central Node-controlled Off-chain Payment Channel Rebalancing Scheme
|
|
Wei-Jun Gao, Ya-Qian Yue, and Xiao-Qin Wang, Vol. 26, No. 2, 2024, pp. 257-269 Article Full Text PDF |
||
13. | A Lightweight Image Encryption Algorithm Based on Dual Chaotic System and Dynamic S-box
|
|
Rui-Hong Chen, Qiu-Yu Zhang, Ling-Tao Meng, and Yi-Lin Liu, Vol. 26, No. 2, 2024, pp. 270-284 Article Full Text PDF |
||
14. | A Key Independence Group Key Management Scheme for Non-Reliable End-to-End Networks
|
|
Jian Zhou, Liyan Sun, and Shihua Huang, Vol. 26, No. 2, 2024, pp. 285-298 Article Full Text PDF |
||
15. | Security Encryption Analysis of Economic Big Data Based on Homomorphic Encryption and Attribute Base
|
|
Limin Chen, Vol. 26, No. 2, 2024, pp. 299-304 Article Full Text PDF |
||
16. | Research on Information Dissemination Security Based on Generative Adversarial Network in Internet of Vehicle Environment
|
|
Junting Zhang, Vol. 26, No. 2, 2024, pp. 305-311 Article Full Text PDF |
||
17. | Data Privacy Protection Based on Unsupervised Learning and Blockchain Technology
|
|
Jian'E Zhao and Jianjun Zhu, Vol. 26, No. 2, 2024, pp. 312-320 Article Full Text PDF |
||
18. | A Novel Capsule Network and Chaotic System Method for English Private Data Encryption
|
|
Yuqiang Wang, Vol. 26, No. 2, 2024, pp. 321-328 Article Full Text PDF |
||
19. | A Novel Nodes Data Security Communication Model of Internet of Vehicles Based on Mobile Edge Computing
|
|
Zengyong Xu, Vol. 26, No. 2, 2024, pp. 329-337 Article Full Text PDF |
||
20. | Production Command Cockpit Safety Management System Based on Deep Neural Network
|
|
Tian Liang, Zhao Qi Gen, Zhao Zhi Ping, Chen Da, and Gu Shi Qiang, Vol. 26, No. 2, 2024, pp. 338-348 Article Full Text PDF |
||