Quick Search:

Volume: 26, No: 2 (March 1, 2024)

International Journal of Network Security

1. A Study on Cypher Assignment Based on Secrecy Capacity
Cheng-Ying Yang, Jong-Shin Chen, Jenq-Foung JF Yao, and Min-Shiang Hwang, Vol. 26, No. 2, 2024, pp. 167-172
Article Full Text PDF

2. Research on Blockchain Technology for Security Protection of Network Information Data in the Legal System Background
Dongdong Li, Vol. 26, No. 2, 2024, pp. 173-179
Article Full Text PDF

3. Design and Research of Off-line Transaction Protocols in Remote Areas Under Smart Contracts
Jian Zhou, Shi-Hua Huang, and Shi Yan, Vol. 26, No. 2, 2024, pp. 180-189
Article Full Text PDF

4. A Lightweight Authentication Protocol for Mobile RFID
Tao Pan, Kai-Zhong Zuo, Tao-Chun Wang, and Chun-Hong Deng, Vol. 26, No. 2, 2024, pp. 190-199
Article Full Text PDF

5. Research on the Protection of Personal Sensitive Information and Privacy Data on the Internet Under Legal Regulations
Xiaodan Li, Vol. 26, No. 2, 2024, pp. 200-205
Article Full Text PDF

6. An Erasure Code with Low Repair-Cost Based on A Combined-stripe Encoding Structure
Minjun Sun, Dan Tang, Yue Li, Xie Wang, Hongliang Cai, and Qiong Zeng, Vol. 26, No. 2, 2024, pp. 206-216
Article Full Text PDF

7. Network Security Situational Awareness of Enterprise Control Systems under Machine Learning
Hui You, Vol. 26, No. 2, 2024, pp. 217-223
Article Full Text PDF

8. Transform Sequential Data to Image for Detecting Covert Timing Channel
Xuwen Huang, Yonghong Chen, Xiaolong Zhuang, and Yuwei Lin, Vol. 26, No. 2, 2024, pp. 224-234
Article Full Text PDF

9. Transformer-based Image Super-Resolution Defense Against Adversarial Attacks
Zi-Han Liu, Vol. 26, No. 2, 2024, pp. 235-243
Article Full Text PDF

10. Color Image Encryption Algorithm with ZigZag Transform and DNA Coding Based on Fractional Order 5D Hyperchaotic System
Fanqi Meng and Gang Wu, Vol. 26, No. 2, 2024, pp. 244-251
Article Full Text PDF

11. A Note on One Lightweight Authenticated Key Agreement for Fog-enabled IoT Deployment
Lihua Liu, Yingqing Jia, and Zhengjun Cao, Vol. 26, No. 2, 2024, pp. 252-256
Article Full Text PDF

12. Design and Implementation of a Central Node-controlled Off-chain Payment Channel Rebalancing Scheme
Wei-Jun Gao, Ya-Qian Yue, and Xiao-Qin Wang, Vol. 26, No. 2, 2024, pp. 257-269
Article Full Text PDF

13. A Lightweight Image Encryption Algorithm Based on Dual Chaotic System and Dynamic S-box
Rui-Hong Chen, Qiu-Yu Zhang, Ling-Tao Meng, and Yi-Lin Liu, Vol. 26, No. 2, 2024, pp. 270-284
Article Full Text PDF

14. A Key Independence Group Key Management Scheme for Non-Reliable End-to-End Networks
Jian Zhou, Liyan Sun, and Shihua Huang, Vol. 26, No. 2, 2024, pp. 285-298
Article Full Text PDF

15. Security Encryption Analysis of Economic Big Data Based on Homomorphic Encryption and Attribute Base
Limin Chen, Vol. 26, No. 2, 2024, pp. 299-304
Article Full Text PDF

16. Research on Information Dissemination Security Based on Generative Adversarial Network in Internet of Vehicle Environment
Junting Zhang, Vol. 26, No. 2, 2024, pp. 305-311
Article Full Text PDF

17. Data Privacy Protection Based on Unsupervised Learning and Blockchain Technology
Jian'E Zhao and Jianjun Zhu, Vol. 26, No. 2, 2024, pp. 312-320
Article Full Text PDF

18. A Novel Capsule Network and Chaotic System Method for English Private Data Encryption
Yuqiang Wang, Vol. 26, No. 2, 2024, pp. 321-328
Article Full Text PDF

19. A Novel Nodes Data Security Communication Model of Internet of Vehicles Based on Mobile Edge Computing
Zengyong Xu, Vol. 26, No. 2, 2024, pp. 329-337
Article Full Text PDF

20. Production Command Cockpit Safety Management System Based on Deep Neural Network
Tian Liang, Zhao Qi Gen, Zhao Zhi Ping, Chen Da, and Gu Shi Qiang, Vol. 26, No. 2, 2024, pp. 338-348
Article Full Text PDF