Quick Search:

Online First:

International Journal of Network Security

1. Formal Analysis and Improvement of SSL Protocol Based on DDMP Framework
Lei Yu and Shou-ren Liu
Article Full Text PDF

2. A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
Liping Qiao, Xueting Jia, and Fanjin Zeng
Article Full Text PDF

3. A Lightweight Authenticated Key Agreement Scheme for Securing Group Messages
Qi Yuan, Hao Yuan, Ershuai Xu, Meitong Zhou, Jing Zhao, and Yue Shao
Article Full Text PDF

4. Private Set Intersection Cardinality in the Multi-User Setting
Qingquan Bian, Yue Zhang, Chang Song, and Axin Wu
Article Full Text PDF

5. Robust Extreme Learning Machine Regression Based on Elastic Net
Han Zhang, Kuaini Wang, and Yuzhu Jiang
Article Full Text PDF

6. Multi-tag Coexistence Proof Protocol Based on Parity Check Patching Operation
Zhen-Hui Li and Fang-Ming Cao
Article Full Text PDF

7. AELA: An Ensemble Adversarial Attack Method Based on Sensitive Areas Fusion and Adaptive Weights
Zhenhao Yan, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Ruichun Gu
Article Full Text PDF

8. Fine-Grained Multi-Level Security Access Control Models in Industrial OT Networks
Pengshou Xie, Linge Qi, Yongping Kang, Tao Feng, Pengfei Li, and Jialin He
Article Full Text PDF

9. A Location Semantic Sensing Model Based on Markov Process for IoV
Pengshou Xie, Xinyu Fan, Yongping Kang, Tao Feng, Cunhuan Tan, and Jiahuan Lei
Article Full Text PDF

10. SAH-RBAC: An Access Control Scheme to Solve Over-Authorisation in Industrial OT Networks
Pengshou Xie, Yuxiang Ran, Yongping Kang, Tao Feng, Xinghui Yang, and Chao Yang
Article Full Text PDF

11. AC-DD: A Fine-Grain Access Control Scheme Supporting Data Deduplication in Vehicular Named Data Networking
Kai He, Zhan Chen, Jiaoli Shi, Shengyuan Shi, Yuan Wu, and Yanhua Xu
Article Full Text PDF

12. A Method for Detecting Malicious Traffic in the Internet of Things Based on Deep Learning and Data Augmentation
Ronglei Zhang
Article Full Text PDF

13. A Novel Secret Sharing Scheme Based on Newton's Interpolation with Public Verification
Yujie Shen, Yue Li, Dan Tang, Lei Su, and Hongliang Cai
Article Full Text PDF

14. PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao
Article Full Text PDF

15. KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
Hongling Jiang, Jinzhi Lin, and Haiyan Kang
Article Full Text PDF

16. Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
Yan Cai
Article Full Text PDF

17. SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
Junheng Wang
Article Full Text PDF

18. Detection and Classification of Packed Malware Based on Target Detection Networks
Yuntao Zhao, Yongnan Chen, and Wei Liu
Article Full Text PDF

19. Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
Ai-Fen Lu and Yong-Ping Xiong
Article Full Text PDF

20. Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu
Article Full Text PDF

21. Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan
Article Full Text PDF

22. A Lightweight Data Secure Sharing Scheme Supporting Ciphertext Aggregation in the Social Internet-of-Things
Jiaoli Shi, Liang Wang, Kai He, Zhuolin Mei, Liya Xu, Bin Wu, and Shimao Yao
Article Full Text PDF

23. Study and Implementation of Split Multi-Channel Rebalancing Strategy for Off-Chain Payments
Wei-Jun Gao, Jia-Ming Guo, and Cheng-ying Jiao
Article Full Text PDF

24. Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing
Article Full Text PDF

25. Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi
Article Full Text PDF

26. RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
Feng-Chun Lin and Wei-Qing Wan
Article Full Text PDF

27. Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong
Article Full Text PDF

28. A Novel Off-Chain Transaction Framework for Channel Cooperation
Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang
Article Full Text PDF

29. Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang
Article Full Text PDF

30. Anonymous Credential Protocol Based on SM2 Digital Signature
Chenxiang Zhang and Weiji Yang
Article Full Text PDF

31. Network Security Control by Integrating Improved Genetic Algorithm and Data Transmission Encryption Algorithm
Jianjun Wu
Article Full Text PDF

32. A Novel Lightweight and Secure Authentication in Internet of Drones
Xiaokun Chen, Shuhuan Wang, Yimin Wang, and Liangliang Song
Article Full Text PDF

33. Monocular Depth Estimation Using Geometric Perception Fusion
Chunhua Wang, Ying Gao, and Zhenyu Wang
Article Full Text PDF

34. Pscale: An Efficient RAID-6 Scaling Scheme Based on P-code
Yuheng Wang, Pan Xiong, Cong Li, Dan Tang, Hongliang Cai, Jun Yang, and Jing Gong
Article Full Text PDF

35. Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang
Article Full Text PDF