| International Journal of Network Security | ||
| 1. | Image Encryption Based on Hyperchaotic System and Arnold Double Scrambling
|
|
| Lei Wang, Vol. 27, No. 4, 2025, pp. 647-655 Article Full Text PDF |
||
| 2. | Research on Dynamic Access Control Scheme for Sensitive Data in Smart Home Cloud Platforms
|
|
| Pengshou Xie, Pengyun Zhang, Yongping Kang, Xiaoye Li, Linge Qi, and Kai Wang, Vol. 27, No. 4, 2025, pp. 656-665 Article Full Text PDF |
||
| 3. | Design of a secure data transmission and task allocation model based on chaotic secure communication and many-to-many matching algorithm
|
|
| Tanna Guo and Ning Wang, Vol. 27, No. 4, 2025, pp. 666-674 Article Full Text PDF |
||
| 4. | Security Protection Methods for Distributed Sensor Networks Based on Improved Dynamic Event Triggering Mechanism
|
|
| Can Guo, Yabing Li, and Xuhui Yang, Vol. 27, No. 4, 2025, pp. 675-684 Article Full Text PDF |
||
| 5. | Pscale: An Efficient RAID-6 Scaling Scheme Based on P-code
|
|
| Yuheng Wang, Pan Xiong, Cong Li, Dan Tang, Hongliang Cai, Jun Yang, and Jing Gong, Vol. 27, No. 4, 2025, pp. 685-696 Article Full Text PDF |
||
| 6. | Network Security Control by Integrating Improved Genetic Algorithm and Data Transmission Encryption Algorithm
|
|
| Jianjun Wu, Vol. 27, No. 4, 2025, pp. 697-706 Article Full Text PDF |
||
| 7. | A Novel Secret Sharing Scheme Based on Newton's Interpolation with Public Verification
|
|
| Yujie Shen, Yue Li, Dan Tang, Lei Su, and Hongliang Cai, Vol. 27, No. 4, 2025, pp. 707-714 Article Full Text PDF |
||
| 8. | A Method for Detecting Malicious Traffic in the Internet of Things Based on Deep Learning and Data Augmentation
|
|
| Ronglei Zhang, Vol. 27, No. 4, 2025, pp. 715-725 Article Full Text PDF |
||
| 9. | AC-DD: A Fine-Grain Access Control Scheme Supporting Data Deduplication in Vehicular Named Data Networking
|
|
| Kai He, Zhan Chen, Jiaoli Shi, Shengyuan Shi, Yuan Wu, and Yanhua Xu, Vol. 27, No. 4, 2025, pp. 726-735 Article Full Text PDF |
||
| 10. | Multi-tag Coexistence Proof Protocol Based on Parity Check Patching Operation
|
|
| Zhen-Hui Li and Fang-Ming Cao, Vol. 27, No. 4, 2025, pp. 736-743 Article Full Text PDF |
||
| 11. | Robust Extreme Learning Machine Regression Based on Elastic Net
|
|
| Han Zhang, Kuaini Wang, and Yuzhu Jiang, Vol. 27, No. 4, 2025, pp. 744-756 Article Full Text PDF |
||
| 12. | CPLA:Cuckoo-lter-assisted Pairing-free Lightweight Anonymous Identity Authentication for IoMT
|
|
| Shu Wu, Ai-Qing Zhang, Xue-Li Nie, Xin-Rong Ye, and Mao Ye, Vol. 27, No. 4, 2025, pp. 757-769 Article Full Text PDF |
||
| 13. | Security Analysis of Economic Data Based on Blockchain Convolutional Sparse Representation and Its Application in Education Management
|
|
| Yueyue Dong, Vol. 27, No. 4, 2025, pp. 770-776 Article Full Text PDF |
||
| 14. | A Lightweight Authenticated Key Agreement Scheme for Securing Group Messages
|
|
| Qi Yuan, Hao Yuan, Ershuai Xu, Meitong Zhou, Jing Zhao, and Yue Shao, Vol. 27, No. 4, 2025, pp. 777-787 Article Full Text PDF |
||
| 15. | Private Set Intersection Cardinality in the Multi-User Setting
|
|
| Qingquan Bian, Yue Zhang, Chang Song, and Axin Wu, Vol. 27, No. 4, 2025, pp. 788-795 Article Full Text PDF |
||
| 16. | AELA: An Ensemble Adversarial Attack Method Based on Sensitive Areas Fusion and Adaptive Weights
|
|
| Zhenhao Yan, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Ruichun Gu, Vol. 27, No. 4, 2025, pp. 796-808 Article Full Text PDF |
||
| 17. | Application of Improved RVM Algorithm in Security Monitoring of University Campus Network
|
|
| Lantao Li and Yu Wang, Vol. 27, No. 4, 2025, pp. 809-817 Article Full Text PDF |
||
| 18. | A Novel Lightweight and Secure Authentication in Internet of Drones
|
|
| Xiaokun Chen, Shuhuan Wang, Yimin Wang, and Liangliang Song, Vol. 27, No. 4, 2025, pp. 818-823 Article Full Text PDF |
||
| 19. | A Lightweight Data Secure Sharing Scheme Supporting Ciphertext Aggregation in the Social Internet-of-Things
|
|
| Jiaoli Shi, Liang Wang, Kai He, Zhuolin Mei, Liya Xu, Bin Wu, and Shimao Yao, Vol. 27, No. 4, 2025, pp. 824-837 Article Full Text PDF |
||
| 20. | Study and Implementation of Split Multi-Channel Rebalancing Strategy for Off-Chain Payments
|
|
| Wei-Jun Gao, Jia-Ming Guo, and Cheng-ying Jiao, Vol. 27, No. 4, 2025, pp. 838-849 Article Full Text PDF |
||
| 21. | Research on the Prevention of Financial Information Fraud of Listed Companies from The Perspective of Blockchain
|
|
| Hui Chen and Han Xu, Vol. 27, No. 4, 2025, pp. 850-856 Article Full Text PDF |
||
| 22. | Access Control and Encryption Protection of Private Data: ABE Algorithm
|
|
| Jianhua Liang and Ziquan Hu, Vol. 27, No. 4, 2025, pp. 857-863 Article Full Text PDF |
||
| 23. | Subject index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 24. | Author index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 25. | Reviewer index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 26. | All Papers to volume 27 (2025)
|
|
| Article Full Text PDF | ||