International Journal of Network Security | ||
1. | Formal Analysis and Improvement of SSL Protocol Based on DDMP Framework
|
|
Lei Yu and Shou-ren Liu Article Full Text PDF |
||
2. | A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
|
|
Liping Qiao, Xueting Jia, and Fanjin Zeng Article Full Text PDF |
||
3. | A Lightweight Authenticated Key Agreement Scheme for Securing Group Messages
|
|
Qi Yuan, Hao Yuan, Ershuai Xu, Meitong Zhou, Jing Zhao, and Yue Shao Article Full Text PDF |
||
4. | Private Set Intersection Cardinality in the Multi-User Setting
|
|
Qingquan Bian, Yue Zhang, Chang Song, and Axin Wu Article Full Text PDF |
||
5. | Robust Extreme Learning Machine Regression Based on Elastic Net
|
|
Han Zhang, Kuaini Wang, and Yuzhu Jiang Article Full Text PDF |
||
6. | Multi-tag Coexistence Proof Protocol Based on Parity Check Patching Operation
|
|
Zhen-Hui Li and Fang-Ming Cao Article Full Text PDF |
||
7. | AELA: An Ensemble Adversarial Attack Method Based on Sensitive Areas Fusion and Adaptive Weights
|
|
Zhenhao Yan, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Ruichun Gu Article Full Text PDF |
||
8. | Fine-Grained Multi-Level Security Access Control Models in Industrial OT Networks
|
|
Pengshou Xie, Linge Qi, Yongping Kang, Tao Feng, Pengfei Li, and Jialin He Article Full Text PDF |
||
9. | A Location Semantic Sensing Model Based on Markov Process for IoV
|
|
Pengshou Xie, Xinyu Fan, Yongping Kang, Tao Feng, Cunhuan Tan, and Jiahuan Lei Article Full Text PDF |
||
10. | SAH-RBAC: An Access Control Scheme to Solve Over-Authorisation in Industrial OT Networks
|
|
Pengshou Xie, Yuxiang Ran, Yongping Kang, Tao Feng, Xinghui Yang, and Chao Yang Article Full Text PDF |
||
11. | AC-DD: A Fine-Grain Access Control Scheme Supporting Data Deduplication in Vehicular Named Data Networking
|
|
Kai He, Zhan Chen, Jiaoli Shi, Shengyuan Shi, Yuan Wu, and Yanhua Xu Article Full Text PDF |
||
12. | A Method for Detecting Malicious Traffic in the Internet of Things Based on Deep Learning and Data Augmentation
|
|
Ronglei Zhang Article Full Text PDF |
||
13. | A Novel Secret Sharing Scheme Based on Newton's Interpolation with Public Verification
|
|
Yujie Shen, Yue Li, Dan Tang, Lei Su, and Hongliang Cai Article Full Text PDF |
||
14. | PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
|
|
Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao Article Full Text PDF |
||
15. | KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
|
|
Hongling Jiang, Jinzhi Lin, and Haiyan Kang Article Full Text PDF |
||
16. | Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
|
|
Yan Cai Article Full Text PDF |
||
17. | SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
|
|
Junheng Wang Article Full Text PDF |
||
18. | Detection and Classification of Packed Malware Based on Target Detection Networks
|
|
Yuntao Zhao, Yongnan Chen, and Wei Liu Article Full Text PDF |
||
19. | Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
|
|
Ai-Fen Lu and Yong-Ping Xiong Article Full Text PDF |
||
20. | Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
|
|
Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu Article Full Text PDF |
||
21. | Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
|
|
Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan Article Full Text PDF |
||
22. | A Lightweight Data Secure Sharing Scheme Supporting Ciphertext Aggregation in the Social Internet-of-Things
|
|
Jiaoli Shi, Liang Wang, Kai He, Zhuolin Mei, Liya Xu, Bin Wu, and Shimao Yao Article Full Text PDF |
||
23. | Study and Implementation of Split Multi-Channel Rebalancing Strategy for Off-Chain Payments
|
|
Wei-Jun Gao, Jia-Ming Guo, and Cheng-ying Jiao Article Full Text PDF |
||
24. | Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
|
|
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing Article Full Text PDF |
||
25. | Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
|
|
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi Article Full Text PDF |
||
26. | RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
|
|
Feng-Chun Lin and Wei-Qing Wan Article Full Text PDF |
||
27. | Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
|
|
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong Article Full Text PDF |
||
28. | A Novel Off-Chain Transaction Framework for Channel Cooperation
|
|
Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang Article Full Text PDF |
||
29. | Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
|
|
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang Article Full Text PDF |
||
30. | Anonymous Credential Protocol Based on SM2 Digital Signature
|
|
Chenxiang Zhang and Weiji Yang Article Full Text PDF |
||
31. | Network Security Control by Integrating Improved Genetic Algorithm and Data Transmission Encryption Algorithm
|
|
Jianjun Wu Article Full Text PDF |
||
32. | A Novel Lightweight and Secure Authentication in Internet of Drones
|
|
Xiaokun Chen, Shuhuan Wang, Yimin Wang, and Liangliang Song Article Full Text PDF |
||
33. | Monocular Depth Estimation Using Geometric Perception Fusion
|
|
Chunhua Wang, Ying Gao, and Zhenyu Wang Article Full Text PDF |
||
34. | Pscale: An Efficient RAID-6 Scaling Scheme Based on P-code
|
|
Yuheng Wang, Pan Xiong, Cong Li, Dan Tang, Hongliang Cai, Jun Yang, and Jing Gong Article Full Text PDF |
||
35. | Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
|
|
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang Article Full Text PDF |
||