Quick Search:

Volume: 27, No: 4 (July 1, 2025)

International Journal of Network Security

1. Image Encryption Based on Hyperchaotic System and Arnold Double Scrambling
Lei Wang, Vol. 27, No. 4, 2025, pp. 647-655
Article Full Text PDF

2. Research on Dynamic Access Control Scheme for Sensitive Data in Smart Home Cloud Platforms
Pengshou Xie, Pengyun Zhang, Yongping Kang, Xiaoye Li, Linge Qi, and Kai Wang, Vol. 27, No. 4, 2025, pp. 656-665
Article Full Text PDF

3. Design of a secure data transmission and task allocation model based on chaotic secure communication and many-to-many matching algorithm
Tanna Guo and Ning Wang, Vol. 27, No. 4, 2025, pp. 666-674
Article Full Text PDF

4. Security Protection Methods for Distributed Sensor Networks Based on Improved Dynamic Event Triggering Mechanism
Can Guo, Yabing Li, and Xuhui Yang, Vol. 27, No. 4, 2025, pp. 675-684
Article Full Text PDF

5. Pscale: An Efficient RAID-6 Scaling Scheme Based on P-code
Yuheng Wang, Pan Xiong, Cong Li, Dan Tang, Hongliang Cai, Jun Yang, and Jing Gong, Vol. 27, No. 4, 2025, pp. 685-696
Article Full Text PDF

6. Network Security Control by Integrating Improved Genetic Algorithm and Data Transmission Encryption Algorithm
Jianjun Wu, Vol. 27, No. 4, 2025, pp. 697-706
Article Full Text PDF

7. A Novel Secret Sharing Scheme Based on Newton's Interpolation with Public Verification
Yujie Shen, Yue Li, Dan Tang, Lei Su, and Hongliang Cai, Vol. 27, No. 4, 2025, pp. 707-714
Article Full Text PDF

8. A Method for Detecting Malicious Traffic in the Internet of Things Based on Deep Learning and Data Augmentation
Ronglei Zhang, Vol. 27, No. 4, 2025, pp. 715-725
Article Full Text PDF

9. AC-DD: A Fine-Grain Access Control Scheme Supporting Data Deduplication in Vehicular Named Data Networking
Kai He, Zhan Chen, Jiaoli Shi, Shengyuan Shi, Yuan Wu, and Yanhua Xu, Vol. 27, No. 4, 2025, pp. 726-735
Article Full Text PDF

10. Multi-tag Coexistence Proof Protocol Based on Parity Check Patching Operation
Zhen-Hui Li and Fang-Ming Cao, Vol. 27, No. 4, 2025, pp. 736-743
Article Full Text PDF

11. Robust Extreme Learning Machine Regression Based on Elastic Net
Han Zhang, Kuaini Wang, and Yuzhu Jiang, Vol. 27, No. 4, 2025, pp. 744-756
Article Full Text PDF

12. CPLA:Cuckoo- lter-assisted Pairing-free Lightweight Anonymous Identity Authentication for IoMT
Shu Wu, Ai-Qing Zhang, Xue-Li Nie, Xin-Rong Ye, and Mao Ye, Vol. 27, No. 4, 2025, pp. 757-769
Article Full Text PDF

13. Security Analysis of Economic Data Based on Blockchain Convolutional Sparse Representation and Its Application in Education Management
Yueyue Dong, Vol. 27, No. 4, 2025, pp. 770-776
Article Full Text PDF

14. A Lightweight Authenticated Key Agreement Scheme for Securing Group Messages
Qi Yuan, Hao Yuan, Ershuai Xu, Meitong Zhou, Jing Zhao, and Yue Shao, Vol. 27, No. 4, 2025, pp. 777-787
Article Full Text PDF

15. Private Set Intersection Cardinality in the Multi-User Setting
Qingquan Bian, Yue Zhang, Chang Song, and Axin Wu, Vol. 27, No. 4, 2025, pp. 788-795
Article Full Text PDF

16. AELA: An Ensemble Adversarial Attack Method Based on Sensitive Areas Fusion and Adaptive Weights
Zhenhao Yan, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Ruichun Gu, Vol. 27, No. 4, 2025, pp. 796-808
Article Full Text PDF

17. Application of Improved RVM Algorithm in Security Monitoring of University Campus Network
Lantao Li and Yu Wang, Vol. 27, No. 4, 2025, pp. 809-817
Article Full Text PDF

18. A Novel Lightweight and Secure Authentication in Internet of Drones
Xiaokun Chen, Shuhuan Wang, Yimin Wang, and Liangliang Song, Vol. 27, No. 4, 2025, pp. 818-823
Article Full Text PDF

19. A Lightweight Data Secure Sharing Scheme Supporting Ciphertext Aggregation in the Social Internet-of-Things
Jiaoli Shi, Liang Wang, Kai He, Zhuolin Mei, Liya Xu, Bin Wu, and Shimao Yao, Vol. 27, No. 4, 2025, pp. 824-837
Article Full Text PDF

20. Study and Implementation of Split Multi-Channel Rebalancing Strategy for Off-Chain Payments
Wei-Jun Gao, Jia-Ming Guo, and Cheng-ying Jiao, Vol. 27, No. 4, 2025, pp. 838-849
Article Full Text PDF

21. Research on the Prevention of Financial Information Fraud of Listed Companies from The Perspective of Blockchain
Hui Chen and Han Xu, Vol. 27, No. 4, 2025, pp. 850-856
Article Full Text PDF

22. Access Control and Encryption Protection of Private Data: ABE Algorithm
Jianhua Liang and Ziquan Hu, Vol. 27, No. 4, 2025, pp. 857-863
Article Full Text PDF

23. Subject index to volume 27 (2025)
Article Full Text PDF

24. Author index to volume 27 (2025)
Article Full Text PDF

25. Reviewer index to volume 27 (2025)
Article Full Text PDF

26. All Papers to volume 27 (2025)
Article Full Text PDF