International Journal of Network Security | ||
1. | Image Encryption Based on Hyperchaotic System and Arnold Double Scrambling
|
|
Lei Wang, Vol. 27, No. 4, 2025, pp. 647-655 Article Full Text PDF |
||
2. | Research on Dynamic Access Control Scheme for Sensitive Data in Smart Home Cloud Platforms
|
|
Pengshou Xie, Pengyun Zhang, Yongping Kang, Xiaoye Li, Linge Qi, and Kai Wang, Vol. 27, No. 4, 2025, pp. 656-665 Article Full Text PDF |
||
3. | Design of a secure data transmission and task allocation model based on chaotic secure communication and many-to-many matching algorithm
|
|
Tanna Guo and Ning Wang, Vol. 27, No. 4, 2025, pp. 666-674 Article Full Text PDF |
||
4. | Security Protection Methods for Distributed Sensor Networks Based on Improved Dynamic Event Triggering Mechanism
|
|
Can Guo, Yabing Li, and Xuhui Yang, Vol. 27, No. 4, 2025, pp. 675-684 Article Full Text PDF |
||
5. | Pscale: An Efficient RAID-6 Scaling Scheme Based on P-code
|
|
Yuheng Wang, Pan Xiong, Cong Li, Dan Tang, Hongliang Cai, Jun Yang, and Jing Gong, Vol. 27, No. 4, 2025, pp. 685-696 Article Full Text PDF |
||
6. | Network Security Control by Integrating Improved Genetic Algorithm and Data Transmission Encryption Algorithm
|
|
Jianjun Wu, Vol. 27, No. 4, 2025, pp. 697-706 Article Full Text PDF |
||
7. | A Novel Secret Sharing Scheme Based on Newton's Interpolation with Public Verification
|
|
Yujie Shen, Yue Li, Dan Tang, Lei Su, and Hongliang Cai, Vol. 27, No. 4, 2025, pp. 707-714 Article Full Text PDF |
||
8. | A Method for Detecting Malicious Traffic in the Internet of Things Based on Deep Learning and Data Augmentation
|
|
Ronglei Zhang, Vol. 27, No. 4, 2025, pp. 715-725 Article Full Text PDF |
||
9. | AC-DD: A Fine-Grain Access Control Scheme Supporting Data Deduplication in Vehicular Named Data Networking
|
|
Kai He, Zhan Chen, Jiaoli Shi, Shengyuan Shi, Yuan Wu, and Yanhua Xu, Vol. 27, No. 4, 2025, pp. 726-735 Article Full Text PDF |
||
10. | Multi-tag Coexistence Proof Protocol Based on Parity Check Patching Operation
|
|
Zhen-Hui Li and Fang-Ming Cao, Vol. 27, No. 4, 2025, pp. 736-743 Article Full Text PDF |
||
11. | Robust Extreme Learning Machine Regression Based on Elastic Net
|
|
Han Zhang, Kuaini Wang, and Yuzhu Jiang, Vol. 27, No. 4, 2025, pp. 744-756 Article Full Text PDF |
||
12. | CPLA:Cuckoo-lter-assisted Pairing-free Lightweight Anonymous Identity Authentication for IoMT
|
|
Shu Wu, Ai-Qing Zhang, Xue-Li Nie, Xin-Rong Ye, and Mao Ye, Vol. 27, No. 4, 2025, pp. 757-769 Article Full Text PDF |
||
13. | Security Analysis of Economic Data Based on Blockchain Convolutional Sparse Representation and Its Application in Education Management
|
|
Yueyue Dong, Vol. 27, No. 4, 2025, pp. 770-776 Article Full Text PDF |
||
14. | A Lightweight Authenticated Key Agreement Scheme for Securing Group Messages
|
|
Qi Yuan, Hao Yuan, Ershuai Xu, Meitong Zhou, Jing Zhao, and Yue Shao, Vol. 27, No. 4, 2025, pp. 777-787 Article Full Text PDF |
||
15. | Private Set Intersection Cardinality in the Multi-User Setting
|
|
Qingquan Bian, Yue Zhang, Chang Song, and Axin Wu, Vol. 27, No. 4, 2025, pp. 788-795 Article Full Text PDF |
||
16. | AELA: An Ensemble Adversarial Attack Method Based on Sensitive Areas Fusion and Adaptive Weights
|
|
Zhenhao Yan, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Ruichun Gu, Vol. 27, No. 4, 2025, pp. 796-808 Article Full Text PDF |
||
17. | Application of Improved RVM Algorithm in Security Monitoring of University Campus Network
|
|
Lantao Li and Yu Wang, Vol. 27, No. 4, 2025, pp. 809-817 Article Full Text PDF |
||
18. | A Novel Lightweight and Secure Authentication in Internet of Drones
|
|
Xiaokun Chen, Shuhuan Wang, Yimin Wang, and Liangliang Song, Vol. 27, No. 4, 2025, pp. 818-823 Article Full Text PDF |
||
19. | A Lightweight Data Secure Sharing Scheme Supporting Ciphertext Aggregation in the Social Internet-of-Things
|
|
Jiaoli Shi, Liang Wang, Kai He, Zhuolin Mei, Liya Xu, Bin Wu, and Shimao Yao, Vol. 27, No. 4, 2025, pp. 824-837 Article Full Text PDF |
||
20. | Study and Implementation of Split Multi-Channel Rebalancing Strategy for Off-Chain Payments
|
|
Wei-Jun Gao, Jia-Ming Guo, and Cheng-ying Jiao, Vol. 27, No. 4, 2025, pp. 838-849 Article Full Text PDF |
||
21. | Research on the Prevention of Financial Information Fraud of Listed Companies from The Perspective of Blockchain
|
|
Hui Chen and Han Xu, Vol. 27, No. 4, 2025, pp. 850-856 Article Full Text PDF |
||
22. | Access Control and Encryption Protection of Private Data: ABE Algorithm
|
|
Jianhua Liang and Ziquan Hu, Vol. 27, No. 4, 2025, pp. 857-863 Article Full Text PDF |
||
23. | Subject index to volume 27 (2025)
|
|
Article Full Text PDF | ||
24. | Author index to volume 27 (2025)
|
|
Article Full Text PDF | ||
25. | Reviewer index to volume 27 (2025)
|
|
Article Full Text PDF | ||
26. | All Papers to volume 27 (2025)
|
|
Article Full Text PDF | ||