International Journal of Network Security | ||
1. | Research on Searchable Encryption Scheme for Internet of Vehicles Based on Trusted Authorization and Keyword Dynamic Update
|
|
Pengshou Xie, Xiaoye Li, Yongping Kang, Jiafeng Zhu, Wanjun Shao, and Cunhuan Tan, Vol. 27, No. 1, 2025, pp. 1-11 Article Full Text PDF |
||
2. | Learnable Speech Encryption Algorithm Based on Frequency-Domain Scrambling
|
|
Qiu-yu Zhang and Le-tian Fan, Vol. 27, No. 1, 2025, pp. 12-24 Article Full Text PDF |
||
3. | Privacy-Preserving Supply Chain Payment Solution Based on Blockchain
|
|
Zhenzhen Wang, Momeng Liu, and Mingqiang Shao, Vol. 27, No. 1, 2025, pp. 25-34 Article Full Text PDF |
||
4. | DV-Hop Localization in Wireless Sensor Networks Based on Hybrid Firefly Particle Swarm Optimization
|
|
Hongwei Duan, Vol. 27, No. 1, 2025, pp. 35-45 Article Full Text PDF |
||
5. | Research on Data Security in Supply Chain Financial Business from the Perspective of Blockchain Technology
|
|
Xiaoli Song, Huanhuan Yang, and Wei Cao, Vol. 27, No. 1, 2025, pp. 46-50 Article Full Text PDF |
||
6. | APT Attack Detection in Digital Substations Leveraging The ATT&CK Model
|
|
Liang Zhang, Minhui Ge, Gang Qu, and Futai Zou, Vol. 27, No. 1, 2025, pp. 51-60 Article Full Text PDF |
||
7. | Threshold Huffman-Based Covert Timing Channel Detection
|
|
Yuwei Lin, Yonghong Chen, Xiaolong Zhuang, and Xuwen Huang, Vol. 27, No. 1, 2025, pp. 61-71 Article Full Text PDF |
||
8. | Bidirectional Authentication Protocol for RFID Systems Based on Mms
|
|
Xiao-ping He, Dao-wei Liu, and Yang Wu, Vol. 27, No. 1, 2025, pp. 72-80 Article Full Text PDF |
||
9. | Research on Secure Transmission of Communication Data in Wireless Network Space: Encryption by an Improved AES Algorithm
|
|
Jiqing Cao and Junkuan Gao, Vol. 27, No. 1, 2025, pp. 81-85 Article Full Text PDF |
||
10. | Enhancing Swin Transformer's Defense Against Attacks through Local Implicit Function Reconstruction
|
|
You-kang Chang, Yan-Li, and Xiang Gong, Vol. 27, No. 1, 2025, pp. 86-94 Article Full Text PDF |
||
11. | Cross-chain Transaction of Notaries Based on Two-stage Improved PageRank Algorithm
|
|
Yuqing Fan and Juyan Li, Vol. 27, No. 1, 2025, pp. 95-103 Article Full Text PDF |
||
12. | Research on Security Detection of Blockchain Financial Transactions Based on a Machine Learning Algorithm
|
|
Li Han and Jin Hu, Vol. 27, No. 1, 2025, pp. 104-109 Article Full Text PDF |
||
13. | Information Management and College Student Identity Security Authentication Based on Deep Learning Technology
|
|
Wanli Tu and Wanlin Su, Vol. 27, No. 1, 2025, pp. 110-115 Article Full Text PDF |
||
14. | Intelligent Fraudulent Website Domain Detection Using Deep Neural Networks
|
|
Yeu-Pong Lai, Vol. 27, No. 1, 2025, pp. 116-127 Article Full Text PDF |
||
15. | IIoT Intelligent Anomalous Traffic Detection Technology Based on Elastic Lightweight Width Learning Algorithm
|
|
Shilei Chen, Vol. 27, No. 1, 2025, pp. 128-140 Article Full Text PDF |
||
16. | Intelligent Network Intrusion Detection for Advanced Measurement System Based on CNN-GRU Modeling
|
|
Wei Chen, Vol. 27, No. 1, 2025, pp. 141-151 Article Full Text PDF |
||
17. | Fault Traceability Algorithm for Communication Networks Based on Fault Tree and Decision Tree
|
|
Zhuowen Li, Vol. 27, No. 1, 2025, pp. 152-162 Article Full Text PDF |
||
18. | Design and Application of Wireless Network Planning Model Based on Spatial-Temporal Analysis and Data Mining
|
|
Mailing Zhang and Hongming Wang, Vol. 27, No. 1, 2025, pp. 163-173 Article Full Text PDF |
||
19. | Chaotic Compression Perception Based AS-DSVSBMP Algorithm in Image Information Encryption
|
|
Pei Hao and Mailing Zhang, Vol. 27, No. 1, 2025, pp. 174-184 Article Full Text PDF |
||
20. | CKKS Speech Fully Homomorphic Encryption Method Based on GPU Multi-threading
|
|
Meng-Yang Ren and Qiu-Yu Zhang, Vol. 27, No. 1, 2025, pp. 185-199 Article Full Text PDF |
||
21. | New Odd-Variable Rotation Symmetric Boolean Functions Satisfying Good Cryptographic Characteristics
|
|
Qinglan Zhao, Jiandong Zhang, Dong Zheng, and Luyang Li, Vol. 27, No. 1, 2025, pp. 200-212 Article Full Text PDF |
||
22. | Research on De-identification Applications of LLMs in Medical Records
|
|
Min-Shiang Hwang, Kanza Fatima, Yang-Shu Wang, Nan-I Wu, and Iuon-Chang Lin, Vol. 27, No. 1, 2025, pp. 213-222 Article Full Text PDF |
||
23. | Subject index to volume 27 (2025)
|
|
Article Full Text PDF | ||
24. | Author index to volume 27 (2025)
|
|
Article Full Text PDF | ||
25. | Reviewer index to volume 27 (2025)
|
|
Article Full Text PDF | ||
26. | All Papers to volume 27 (2025)
|
|
Article Full Text PDF | ||