International Journal of Network Security | ||
1. | Blockchain-based Verifiable Multi-Keyword Searchable Encryption Scheme with De-Duplication Support
|
|
Tao Feng, Zhen Qiu, Junli Fang, Yi Wu, and Rong Ma, Vol. 27, No. 3, 2025, pp. 439-451 Article Full Text PDF |
||
2. | Lightweight Two-factor Authentication Protocol for IoT Based on PUF and Wireless Fingerprint Localization
|
|
Jiafeng Zhu, Pengshou Xie, Yongpin Kang, Tao Feng, Xiaoye Li, and Wanjun Shao, Vol. 27, No. 3, 2025, pp. 452-464 Article Full Text PDF |
||
3. | A Blockchain Transaction Data Storage and Access Scheme Based on Searchable Encryption and IPFS
|
|
Pengshou Xie, Wanjun Shao, Yongping Kang, Xiaoye Li, Jiafeng Zhu, and Yinchang Pan, Vol. 27, No. 3, 2025, pp. 465-475 Article Full Text PDF |
||
4. | A Hybrid Deep Learning Approach for Software Just-in-Time Defects Prediction
|
|
Yingting Yu, Mingliang Chen, Chuanhan Zeng, Guoqiang Xie, Benren Pan, Liu Cui, Heyang Sun and Yuancheng Li, Vol. 27, No. 3, 2025, pp. 476-486 Article Full Text PDF |
||
5. | International Trade Trend Prediction under Global Value Chain Background with Neural Network
|
|
Qunying Zou and Defu Zhao, Vol. 27, No. 3, 2025, pp. 487-496 Article Full Text PDF |
||
6. | Security Vulnerability Protection in the Communication Network: A Legal Perspective
|
|
Jingwei Li and Peng Qi, Vol. 27, No. 3, 2025, pp. 497-503 Article Full Text PDF |
||
7. | A Secure Protocol for the Absolute Difference of Two Matrices
|
|
Juanjuan Zhang, Minghui Wang, Xiulian Ma, and Shundong Li, Vol. 27, No. 3, 2025, pp. 504-509 Article Full Text PDF |
||
8. | Intrusion Detection Method for Wireless Sensor Network Based on Residual Convolutional Neural Networks Under Cloud Computing Environment and Its Application in Management
|
|
Zhihao Song, Vol. 27, No. 3, 2025, pp. 510-519 Article Full Text PDF |
||
9. | A Threshold Signature Scheme Based on Lattice for Improved Security in the Age of Quantum Computing
|
|
Jing Lan Zhang and Yan Ren, Vol. 27, No. 3, 2025, pp. 520-526 Article Full Text PDF |
||
10. | Secure Network Image Transmission Algorithm Based on Half Tensor Product Compression Perception and Hybrid Cloud
|
|
Yuanyuan Dong, Vol. 27, No. 3, 2025, pp. 527-539 Article Full Text PDF |
||
11. | Research on Algorithm Model-based Network Defense Technology under Invisible Backdoor Attacks
|
|
Bing Zheng and Lei Du, Vol. 27, No. 3, 2025, pp. 540-547 Article Full Text PDF |
||
12. | New Construction of New Self-dual Linear Error-correcting Codes by Pseudo-random Sequences
|
|
Yuqing Yan, Vol. 27, No. 3, 2025, pp. 548-555 Article Full Text PDF |
||
13. | Collaborative Network Security Protection System Design in Cloud Computing Environment
|
|
Fang Li, Vol. 27, No. 3, 2025, pp. 556-565 Article Full Text PDF |
||
14. | Network Intrusion Detection Combining Laplacian Eigenmaps and Enhanced Density Peak Clustering Algorithms
|
|
Aihua Nian and Peng Zhang, Vol. 27, No. 3, 2025, pp. 566-575 Article Full Text PDF |
||
15. | Network Active Defense Model Based on Deep Residuals and Support Vector Machines
|
|
Yi Shen and Jianwei Chen, Vol. 27, No. 3, 2025, pp. 576-585 Article Full Text PDF |
||
16. | Improved Image Compression Using Bi-branch Transformer-CNN Feature Extractor Network
|
|
Weimei Wu, Jianhua Hu, and Wenying Zeng, Vol. 27, No. 3, 2025, pp. 586-593 Article Full Text PDF |
||
17. | Research on Low Overhead Fast Repair Array Code Algorithm
|
|
Pan Xiong, Tieyuan Hong, Yuheng Wang, Dan Tang, Hongliang Cai, and Junyan Zhang, Vol. 27, No. 3, 2025, pp. 594-604 Article Full Text PDF |
||
18. | Blockchain-Assisted Multi-Party Charging Data Sharing Based on Permission Matrix
|
|
Jing Guo, Wei Liang, Zhimin Gu, Wei Huang, Yunxiao Sun, and Yan Li, Vol. 27, No. 3, 2025, pp. 605-615 Article Full Text PDF |
||
19. | A Secret Image Sharing Scheme with High Embedding Capacity and Detection Rate
|
|
Yixuan Du, Yanhai Zhang, and Jinmei Fan, Vol. 27, No. 3, 2025, pp. 616-623 Article Full Text PDF |
||
20. | Research on Monitoring and Early Warning of Sudden Online Public Opinion Topic by a Model Algorithm
|
|
Haixiang He and Yejing Bao, Vol. 27, No. 3, 2025, pp. 624-630 Article Full Text PDF |
||
21. | Research on Secure Blockchain Digital Resume Storage Systems
|
|
Min-Shiang Hwang, Yung-Ling Chang, and Nan-I Wu, Vol. 27, No. 3, 2025, pp. 631-638 Article Full Text PDF |
||
22. | Research on Secure Payment in the Process of Currency Transactions in Digital Economy Through Blockchain Technology
|
|
Qianyi Luo and Renjun Li, Vol. 27, No. 3, 2025, pp. 639-646 Article Full Text PDF |
||
23. | Subject index to volume 27 (2025)
|
|
Article Full Text PDF | ||
24. | Author index to volume 27 (2025)
|
|
Article Full Text PDF | ||
25. | Reviewer index to volume 27 (2025)
|
|
Article Full Text PDF | ||
26. | All Papers to volume 27 (2025)
|
|
Article Full Text PDF | ||