Quick Search:

Volume: 26, No: 4 (July 1, 2024)

International Journal of Network Security

1. Policy Extraction and Optimization with Top-down and Bottom-up Approaches for Attribute-based Access Control
Wei Sun, Jun Lu, and Mengzhao Wang, Vol. 26, No. 4, 2024, pp. 535-545
Article Full Text PDF

2. Personalized Trajectory Privacy Protection Method Based on Multiple Anonymizers Forwarding
Peng-Shou Xie, Yin-Chang Pan, Tao Feng, Ye Lu, Wan-Jun Shao, and Cun-Huan Tan, Vol. 26, No. 4, 2024, pp. 546-554
Article Full Text PDF

3. Multi-keyword Ciphertext Sorting Search Based on Conformation Graph Convolution Model and Transformer Network
Hang Li, Zeyang Li, Xiaowei Wang, Muhammad Ibrar, and Xinjie Zhu, Vol. 26, No. 4, 2024, pp. 555-564
Article Full Text PDF

4. English Data Encryption Based on U-Net Network and Attention Mechanism in Cloud Computing Environment
Ruoshuang Yin, Vol. 26, No. 4, 2024, pp. 565-572
Article Full Text PDF

5. Art Design Data Privacy Protection Strategy Based on Blockchain Federated Learning and Long Short-term Memory
Jing Yu, Lin Huang, and Lu Zhao, Vol. 26, No. 4, 2024, pp. 573-581
Article Full Text PDF

6. Intelligent Network Security with Session Initiation Protocol and Web Services
Abdallah Handoura and Daniel Bourget, Vol. 26, No. 4, 2024, pp. 582-588
Article Full Text PDF

7. A Fault Recognition Method Based on Convolutional Neural Network
Lei Chen, Jiaqi Shi, and Ting Zhang, Vol. 26, No. 4, 2024, pp. 589-597
Article Full Text PDF

8. A Lattice-based Unidirectional Proxy Re-encryption
Lewei Wang, Mingming Jiang, Yuyan Guo, and Hui Ge, Vol. 26, No. 4, 2024, pp. 598-604
Article Full Text PDF

9. Analysis of One Multifactor Authenticated Key Agreement Scheme for Industrial IoT
Zhengjun Cao, Jiahua Zhu, and Lihua Liu, Vol. 26, No. 4, 2024, pp. 605-609
Article Full Text PDF

10. A Group Repair Codes with Low Recovery-overhead in Distributed Storage System
Wenjie Deng, Cong Li, Tieyuan Hong, and Dan Tang, Vol. 26, No. 4, 2024, pp. 610-621
Article Full Text PDF

11. A Novel Malicious Code Propagation Model Based on Dual Defense and Honeypot Feedback
Chenxi Li, Jianguo Ren, and Fengjiao Li, Vol. 26, No. 4, 2024, pp. 622-634
Article Full Text PDF

12. Study on Nega-Hadamard Transform and Nega-crosscorrelation of Vectorial Boolean Functions
Jingjing Zhang, Zepeng Zhuo, and Guolong Chen, Vol. 26, No. 4, 2024, pp. 635-642
Article Full Text PDF

13. Distributed Parallel Algorithm for Finite Element Multi-Computer System Considering Network Security Performance Evaluation
Yi Li, Vol. 26, No. 4, 2024, pp. 643-654
Article Full Text PDF

14. Multi-user Keyword Searchable Signcryption Scheme in Heterogeneous 5G Network Slicings
Ming Luo, Qibang Zhan, Minrong Qiu, and Li Cen, Vol. 26, No. 4, 2024, pp. 655-666
Article Full Text PDF

15. Enterprise Accounting Management Reform of Industrial Integration Under Intelligent Information Dissemination
Tang Min, Vol. 26, No. 4, 2024, pp. 667-678
Article Full Text PDF

16. Cryptanalysis and Improvement of a Fast Hash Family for Memory Integrity
Chengbo Xu and Shuying Yang, Vol. 26, No. 4, 2024, pp. 679-685
Article Full Text PDF

17. Image Encryption Based on Pixel Decomposition
Chunming Xu and Yong Zhang, Vol. 26, No. 4, 2024, pp. 686-693
Article Full Text PDF

18. An Improved CNN for Intrusion Detection Method Based on ResNet
Zengyu Cai, Pengrong Li, Jianwei Zhang, Yajie Si, and Yuan Feng, Vol. 26, No. 4, 2024, pp. 694-702
Article Full Text PDF

19. Image Enhancement and Cloud Secure Transmission Based on Reversible Image Information Hiding Technology
Zailin Li, Vol. 26, No. 4, 2024, pp. 703-712
Article Full Text PDF

20. An Improvement of A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
Min-Shiang Hwang, Hou-Wen Li, and Cheng-Ying Yang, Vol. 26, No. 4, 2024, pp. 713-718
Article Full Text PDF