International Journal of Network Security | ||
1. | Formal Analysis and Improvement of SSL Protocol Based on DDMP Framework
|
|
Lei Yu and Shou-ren Liu Article Full Text PDF |
||
2. | A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
|
|
Liping Qiao, Xueting Jia, and Fanjin Zeng Article Full Text PDF |
||
3. | PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
|
|
Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao Article Full Text PDF |
||
4. | KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
|
|
Hongling Jiang, Jinzhi Lin, and Haiyan Kang Article Full Text PDF |
||
5. | Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
|
|
Yan Cai Article Full Text PDF |
||
6. | SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
|
|
Junheng Wang Article Full Text PDF |
||
7. | Detection and Classification of Packed Malware Based on Target Detection Networks
|
|
Yuntao Zhao, Yongnan Chen, and Wei Liu Article Full Text PDF |
||
8. | Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
|
|
Ai-Fen Lu and Yong-Ping Xiong Article Full Text PDF |
||
9. | Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
|
|
Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu Article Full Text PDF |
||
10. | Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
|
|
Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan Article Full Text PDF |
||
11. | Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
|
|
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing Article Full Text PDF |
||
12. | Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
|
|
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi Article Full Text PDF |
||
13. | RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
|
|
Feng-Chun Lin and Wei-Qing Wan Article Full Text PDF |
||
14. | Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
|
|
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong Article Full Text PDF |
||
15. | A Novel Off-Chain Transaction Framework for Channel Cooperation
|
|
Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang Article Full Text PDF |
||
16. | Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
|
|
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang Article Full Text PDF |
||
17. | Anonymous Credential Protocol Based on SM2 Digital Signature
|
|
Chenxiang Zhang and Weiji Yang Article Full Text PDF |
||
18. | Monocular Depth Estimation Using Geometric Perception Fusion
|
|
Chunhua Wang, Ying Gao, and Zhenyu Wang Article Full Text PDF |
||
19. | Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
|
|
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang Article Full Text PDF |
||
20. | TS-Code Efficient and Low-Cost Recovery in Storage Systems
|
|
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang Article Full Text PDF |
||
21. | Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
|
|
Huiwen Yuan Article Full Text PDF |
||
22. | DV-Hop Deception Attack Model for Node Information Security in WSNs
|
|
Kongze Li and Chunyan Ou Article Full Text PDF |
||
23. | Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
|
|
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang Article Full Text PDF |
||