International Journal of Network Security | ||
1. | Policy Extraction and Optimization with Top-down and Bottom-up Approaches for Attribute-based Access Control
|
|
Wei Sun, Jun Lu, and Mengzhao Wang, Vol. 26, No. 4, 2024, pp. 535-545 Article Full Text PDF |
||
2. | Personalized Trajectory Privacy Protection Method Based on Multiple Anonymizers Forwarding
|
|
Peng-Shou Xie, Yin-Chang Pan, Tao Feng, Ye Lu, Wan-Jun Shao, and Cun-Huan Tan, Vol. 26, No. 4, 2024, pp. 546-554 Article Full Text PDF |
||
3. | Multi-keyword Ciphertext Sorting Search Based on Conformation Graph Convolution Model and Transformer Network
|
|
Hang Li, Zeyang Li, Xiaowei Wang, Muhammad Ibrar, and Xinjie Zhu, Vol. 26, No. 4, 2024, pp. 555-564 Article Full Text PDF |
||
4. | English Data Encryption Based on U-Net Network and Attention Mechanism in Cloud Computing Environment
|
|
Ruoshuang Yin, Vol. 26, No. 4, 2024, pp. 565-572 Article Full Text PDF |
||
5. | Art Design Data Privacy Protection Strategy Based on Blockchain Federated Learning and Long Short-term Memory
|
|
Jing Yu, Lin Huang, and Lu Zhao, Vol. 26, No. 4, 2024, pp. 573-581 Article Full Text PDF |
||
6. | Intelligent Network Security with Session Initiation Protocol and Web Services
|
|
Abdallah Handoura and Daniel Bourget, Vol. 26, No. 4, 2024, pp. 582-588 Article Full Text PDF |
||
7. | A Fault Recognition Method Based on Convolutional Neural Network
|
|
Lei Chen, Jiaqi Shi, and Ting Zhang, Vol. 26, No. 4, 2024, pp. 589-597 Article Full Text PDF |
||
8. | A Lattice-based Unidirectional Proxy Re-encryption
|
|
Lewei Wang, Mingming Jiang, Yuyan Guo, and Hui Ge, Vol. 26, No. 4, 2024, pp. 598-604 Article Full Text PDF |
||
9. | Analysis of One Multifactor Authenticated Key Agreement Scheme for Industrial IoT
|
|
Zhengjun Cao, Jiahua Zhu, and Lihua Liu, Vol. 26, No. 4, 2024, pp. 605-609 Article Full Text PDF |
||
10. | A Group Repair Codes with Low Recovery-overhead in Distributed Storage System
|
|
Wenjie Deng, Cong Li, Tieyuan Hong, and Dan Tang, Vol. 26, No. 4, 2024, pp. 610-621 Article Full Text PDF |
||
11. | A Novel Malicious Code Propagation Model Based on Dual Defense and Honeypot Feedback
|
|
Chenxi Li, Jianguo Ren, and Fengjiao Li, Vol. 26, No. 4, 2024, pp. 622-634 Article Full Text PDF |
||
12. | Study on Nega-Hadamard Transform and Nega-crosscorrelation of Vectorial Boolean Functions
|
|
Jingjing Zhang, Zepeng Zhuo, and Guolong Chen, Vol. 26, No. 4, 2024, pp. 635-642 Article Full Text PDF |
||
13. | Distributed Parallel Algorithm for Finite Element Multi-Computer System Considering Network Security Performance Evaluation
|
|
Yi Li, Vol. 26, No. 4, 2024, pp. 643-654 Article Full Text PDF |
||
14. | Multi-user Keyword Searchable Signcryption Scheme in Heterogeneous 5G Network Slicings
|
|
Ming Luo, Qibang Zhan, Minrong Qiu, and Li Cen, Vol. 26, No. 4, 2024, pp. 655-666 Article Full Text PDF |
||
15. | Enterprise Accounting Management Reform of Industrial Integration Under Intelligent Information Dissemination
|
|
Tang Min, Vol. 26, No. 4, 2024, pp. 667-678 Article Full Text PDF |
||
16. | Cryptanalysis and Improvement of a Fast Hash Family for Memory Integrity
|
|
Chengbo Xu and Shuying Yang, Vol. 26, No. 4, 2024, pp. 679-685 Article Full Text PDF |
||
17. | Image Encryption Based on Pixel Decomposition
|
|
Chunming Xu and Yong Zhang, Vol. 26, No. 4, 2024, pp. 686-693 Article Full Text PDF |
||
18. | An Improved CNN for Intrusion Detection Method Based on ResNet
|
|
Zengyu Cai, Pengrong Li, Jianwei Zhang, Yajie Si, and Yuan Feng, Vol. 26, No. 4, 2024, pp. 694-702 Article Full Text PDF |
||
19. | Image Enhancement and Cloud Secure Transmission Based on Reversible Image Information Hiding Technology
|
|
Zailin Li, Vol. 26, No. 4, 2024, pp. 703-712 Article Full Text PDF |
||
20. | An Improvement of A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
|
|
Min-Shiang Hwang, Hou-Wen Li, and Cheng-Ying Yang, Vol. 26, No. 4, 2024, pp. 713-718 Article Full Text PDF |
||