| International Journal of Network Security | ||
| 1. | Policy Extraction and Optimization with Top-down and Bottom-up Approaches for Attribute-based Access Control
|
|
| Wei Sun, Jun Lu, and Mengzhao Wang, Vol. 26, No. 4, 2024, pp. 535-545 Article Full Text PDF |
||
| 2. | Personalized Trajectory Privacy Protection Method Based on Multiple Anonymizers Forwarding
|
|
| Peng-Shou Xie, Yin-Chang Pan, Tao Feng, Ye Lu, Wan-Jun Shao, and Cun-Huan Tan, Vol. 26, No. 4, 2024, pp. 546-554 Article Full Text PDF |
||
| 3. | Multi-keyword Ciphertext Sorting Search Based on Conformation Graph Convolution Model and Transformer Network
|
|
| Hang Li, Zeyang Li, Xiaowei Wang, Muhammad Ibrar, and Xinjie Zhu, Vol. 26, No. 4, 2024, pp. 555-564 Article Full Text PDF |
||
| 4. | English Data Encryption Based on U-Net Network and Attention Mechanism in Cloud Computing Environment
|
|
| Ruoshuang Yin, Vol. 26, No. 4, 2024, pp. 565-572 Article Full Text PDF |
||
| 5. | Art Design Data Privacy Protection Strategy Based on Blockchain Federated Learning and Long Short-term Memory
|
|
| Jing Yu, Lin Huang, and Lu Zhao, Vol. 26, No. 4, 2024, pp. 573-581 Article Full Text PDF |
||
| 6. | Intelligent Network Security with Session Initiation Protocol and Web Services
|
|
| Abdallah Handoura and Daniel Bourget, Vol. 26, No. 4, 2024, pp. 582-588 Article Full Text PDF |
||
| 7. | A Fault Recognition Method Based on Convolutional Neural Network
|
|
| Lei Chen, Jiaqi Shi, and Ting Zhang, Vol. 26, No. 4, 2024, pp. 589-597 Article Full Text PDF |
||
| 8. | A Lattice-based Unidirectional Proxy Re-encryption
|
|
| Lewei Wang, Mingming Jiang, Yuyan Guo, and Hui Ge, Vol. 26, No. 4, 2024, pp. 598-604 Article Full Text PDF |
||
| 9. | Analysis of One Multifactor Authenticated Key Agreement Scheme for Industrial IoT
|
|
| Zhengjun Cao, Jiahua Zhu, and Lihua Liu, Vol. 26, No. 4, 2024, pp. 605-609 Article Full Text PDF |
||
| 10. | A Group Repair Codes with Low Recovery-overhead in Distributed Storage System
|
|
| Wenjie Deng, Cong Li, Tieyuan Hong, and Dan Tang, Vol. 26, No. 4, 2024, pp. 610-621 Article Full Text PDF |
||
| 11. | A Novel Malicious Code Propagation Model Based on Dual Defense and Honeypot Feedback
|
|
| Chenxi Li, Jianguo Ren, and Fengjiao Li, Vol. 26, No. 4, 2024, pp. 622-634 Article Full Text PDF |
||
| 12. | Study on Nega-Hadamard Transform and Nega-crosscorrelation of Vectorial Boolean Functions
|
|
| Jingjing Zhang, Zepeng Zhuo, and Guolong Chen, Vol. 26, No. 4, 2024, pp. 635-642 Article Full Text PDF |
||
| 13. | Distributed Parallel Algorithm for Finite Element Multi-Computer System Considering Network Security Performance Evaluation
|
|
| Yi Li, Vol. 26, No. 4, 2024, pp. 643-654 Article Full Text PDF |
||
| 14. | Multi-user Keyword Searchable Signcryption Scheme in Heterogeneous 5G Network Slicings
|
|
| Ming Luo, Qibang Zhan, Minrong Qiu, and Li Cen, Vol. 26, No. 4, 2024, pp. 655-666 Article Full Text PDF |
||
| 15. | Enterprise Accounting Management Reform of Industrial Integration Under Intelligent Information Dissemination
|
|
| Tang Min, Vol. 26, No. 4, 2024, pp. 667-678 Article Full Text PDF |
||
| 16. | Cryptanalysis and Improvement of a Fast Hash Family for Memory Integrity
|
|
| Chengbo Xu and Shuying Yang, Vol. 26, No. 4, 2024, pp. 679-685 Article Full Text PDF |
||
| 17. | Image Encryption Based on Pixel Decomposition
|
|
| Chunming Xu and Yong Zhang, Vol. 26, No. 4, 2024, pp. 686-693 Article Full Text PDF |
||
| 18. | An Improved CNN for Intrusion Detection Method Based on ResNet
|
|
| Zengyu Cai, Pengrong Li, Jianwei Zhang, Yajie Si, and Yuan Feng, Vol. 26, No. 4, 2024, pp. 694-702 Article Full Text PDF |
||
| 19. | Image Enhancement and Cloud Secure Transmission Based on Reversible Image Information Hiding Technology
|
|
| Zailin Li, Vol. 26, No. 4, 2024, pp. 703-712 Article Full Text PDF |
||
| 20. | An Improvement of A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
|
|
| Min-Shiang Hwang, Hou-Wen Li, and Cheng-Ying Yang, Vol. 26, No. 4, 2024, pp. 713-718 Article Full Text PDF |
||