Quick Search:

Online First:

International Journal of Network Security

1. Formal Analysis and Improvement of SSL Protocol Based on DDMP Framework
Lei Yu and Shou-ren Liu
Article Full Text PDF

2. A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
Liping Qiao, Xueting Jia, and Fanjin Zeng
Article Full Text PDF

3. PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao
Article Full Text PDF

4. KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
Hongling Jiang, Jinzhi Lin, and Haiyan Kang
Article Full Text PDF

5. Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
Yan Cai
Article Full Text PDF

6. SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
Junheng Wang
Article Full Text PDF

7. Detection and Classification of Packed Malware Based on Target Detection Networks
Yuntao Zhao, Yongnan Chen, and Wei Liu
Article Full Text PDF

8. Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
Ai-Fen Lu and Yong-Ping Xiong
Article Full Text PDF

9. Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu
Article Full Text PDF

10. Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan
Article Full Text PDF

11. Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing
Article Full Text PDF

12. Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi
Article Full Text PDF

13. RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
Feng-Chun Lin and Wei-Qing Wan
Article Full Text PDF

14. Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong
Article Full Text PDF

15. A Novel Off-Chain Transaction Framework for Channel Cooperation
Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang
Article Full Text PDF

16. Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang
Article Full Text PDF

17. Anonymous Credential Protocol Based on SM2 Digital Signature
Chenxiang Zhang and Weiji Yang
Article Full Text PDF

18. Monocular Depth Estimation Using Geometric Perception Fusion
Chunhua Wang, Ying Gao, and Zhenyu Wang
Article Full Text PDF

19. Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang
Article Full Text PDF

20. TS-Code Efficient and Low-Cost Recovery in Storage Systems
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang
Article Full Text PDF

21. Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
Huiwen Yuan
Article Full Text PDF

22. DV-Hop Deception Attack Model for Node Information Security in WSNs
Kongze Li and Chunyan Ou
Article Full Text PDF

23. Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang
Article Full Text PDF