Quick Search:

Volume: 27, No: 1 (January 1, 2025)

International Journal of Network Security

1. Research on Searchable Encryption Scheme for Internet of Vehicles Based on Trusted Authorization and Keyword Dynamic Update
Pengshou Xie, Xiaoye Li, Yongping Kang, Jiafeng Zhu, Wanjun Shao, and Cunhuan Tan, Vol. 27, No. 1, 2025, pp. 1-11
Article Full Text PDF

2. Learnable Speech Encryption Algorithm Based on Frequency-Domain Scrambling
Qiu-yu Zhang and Le-tian Fan, Vol. 27, No. 1, 2025, pp. 12-24
Article Full Text PDF

3. Privacy-Preserving Supply Chain Payment Solution Based on Blockchain
Zhenzhen Wang, Momeng Liu, and Mingqiang Shao, Vol. 27, No. 1, 2025, pp. 25-34
Article Full Text PDF

4. DV-Hop Localization in Wireless Sensor Networks Based on Hybrid Firefly Particle Swarm Optimization
Hongwei Duan, Vol. 27, No. 1, 2025, pp. 35-45
Article Full Text PDF

5. Research on Data Security in Supply Chain Financial Business from the Perspective of Blockchain Technology
Xiaoli Song, Huanhuan Yang, and Wei Cao, Vol. 27, No. 1, 2025, pp. 46-50
Article Full Text PDF

6. APT Attack Detection in Digital Substations Leveraging The ATT&CK Model
Liang Zhang, Minhui Ge, Gang Qu, and Futai Zou, Vol. 27, No. 1, 2025, pp. 51-60
Article Full Text PDF

7. Threshold Huffman-Based Covert Timing Channel Detection
Yuwei Lin, Yonghong Chen, Xiaolong Zhuang, and Xuwen Huang, Vol. 27, No. 1, 2025, pp. 61-71
Article Full Text PDF

8. Bidirectional Authentication Protocol for RFID Systems Based on Mms
Xiao-ping He, Dao-wei Liu, and Yang Wu, Vol. 27, No. 1, 2025, pp. 72-80
Article Full Text PDF

9. Research on Secure Transmission of Communication Data in Wireless Network Space: Encryption by an Improved AES Algorithm
Jiqing Cao and Junkuan Gao, Vol. 27, No. 1, 2025, pp. 81-85
Article Full Text PDF

10. Enhancing Swin Transformer's Defense Against Attacks through Local Implicit Function Reconstruction
You-kang Chang, Yan-Li, and Xiang Gong, Vol. 27, No. 1, 2025, pp. 86-94
Article Full Text PDF

11. Cross-chain Transaction of Notaries Based on Two-stage Improved PageRank Algorithm
Yuqing Fan and Juyan Li, Vol. 27, No. 1, 2025, pp. 95-103
Article Full Text PDF

12. Research on Security Detection of Blockchain Financial Transactions Based on a Machine Learning Algorithm
Li Han and Jin Hu, Vol. 27, No. 1, 2025, pp. 104-109
Article Full Text PDF

13. Information Management and College Student Identity Security Authentication Based on Deep Learning Technology
Wanli Tu and Wanlin Su, Vol. 27, No. 1, 2025, pp. 110-115
Article Full Text PDF

14. Intelligent Fraudulent Website Domain Detection Using Deep Neural Networks
Yeu-Pong Lai, Vol. 27, No. 1, 2025, pp. 116-127
Article Full Text PDF

15. IIoT Intelligent Anomalous Traffic Detection Technology Based on Elastic Lightweight Width Learning Algorithm
Shilei Chen, Vol. 27, No. 1, 2025, pp. 128-140
Article Full Text PDF

16. Intelligent Network Intrusion Detection for Advanced Measurement System Based on CNN-GRU Modeling
Wei Chen, Vol. 27, No. 1, 2025, pp. 141-151
Article Full Text PDF

17. Fault Traceability Algorithm for Communication Networks Based on Fault Tree and Decision Tree
Zhuowen Li, Vol. 27, No. 1, 2025, pp. 152-162
Article Full Text PDF

18. Design and Application of Wireless Network Planning Model Based on Spatial-Temporal Analysis and Data Mining
Mailing Zhang and Hongming Wang, Vol. 27, No. 1, 2025, pp. 163-173
Article Full Text PDF

19. Chaotic Compression Perception Based AS-DSVSBMP Algorithm in Image Information Encryption
Pei Hao and Mailing Zhang, Vol. 27, No. 1, 2025, pp. 174-184
Article Full Text PDF

20. CKKS Speech Fully Homomorphic Encryption Method Based on GPU Multi-threading
Meng-Yang Ren and Qiu-Yu Zhang, Vol. 27, No. 1, 2025, pp. 185-199
Article Full Text PDF

21. New Odd-Variable Rotation Symmetric Boolean Functions Satisfying Good Cryptographic Characteristics
Qinglan Zhao, Jiandong Zhang, Dong Zheng, and Luyang Li, Vol. 27, No. 1, 2025, pp. 200-212
Article Full Text PDF

22. Research on De-identification Applications of LLMs in Medical Records
Min-Shiang Hwang, Kanza Fatima, Yang-Shu Wang, Nan-I Wu, and Iuon-Chang Lin, Vol. 27, No. 1, 2025, pp. 213-222
Article Full Text PDF

23. Subject index to volume 27 (2025)
Article Full Text PDF

24. Author index to volume 27 (2025)
Article Full Text PDF

25. Reviewer index to volume 27 (2025)
Article Full Text PDF

26. All Papers to volume 27 (2025)
Article Full Text PDF