​
Login / Signup
Int. J. Netw. Secur.
2005
2009
2015
2020
2005
2020
Keyphrases
Publications
volume 22, number 3, 2020
Munawar Hussain
,
Jiadong Ren
,
Awais Akram
Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network.
Int. J. Netw. Secur.
22 (3) (2020)
Zheng-Zhi Tang
,
Xuewen Zeng
,
Zhichuan Guo
,
Mangu Song
Malware Traffic Classification Based on Recurrence Quantification Analysis.
Int. J. Netw. Secur.
22 (3) (2020)
Jing Bi
,
Shoulin Yin
,
Hang Li
,
Lin Teng
,
Chu Zhao
Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems.
Int. J. Netw. Secur.
22 (3) (2020)
Cungang Yang
,
Celia Li
Design of Key Management Protocols for Internet of Things.
Int. J. Netw. Secur.
22 (3) (2020)
Jianmeng Huang
,
Wenchao Huang
,
Fuyou Miao
,
Yan Xiong
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications.
Int. J. Netw. Secur.
22 (3) (2020)
Ke Gu
,
Dianxing Liu
,
Bo Yin
Efficient Group Signature Scheme without Pairings.
Int. J. Netw. Secur.
22 (3) (2020)
Qianlong Dang
,
Hua Ma
,
Zhenhua Liu
,
Ying Xie
Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage.
Int. J. Netw. Secur.
22 (3) (2020)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
A Novel Approach for Component based Application Logic Event Attack Modeling.
Int. J. Netw. Secur.
22 (3) (2020)
Yang Liu
,
Mingxing He
,
Fangyuan Pu
Anonymous Transaction of Digital Currency Based on Blockchain.
Int. J. Netw. Secur.
22 (3) (2020)
Xu Zhao
,
Guangqiu Huang
,
Reza Mousoli
A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm.
Int. J. Netw. Secur.
22 (3) (2020)
volume 22, number 4, 2020
Yongshuang Wei
,
Jianhua Chen
Tripartite Authentication Protocol RFID/NFC Based on ECC.
Int. J. Netw. Secur.
22 (4) (2020)
Zhengjun Cao
,
Xiqi Wang
,
Lihua Liu
A Note on One Popular Non-Interactive Zero-Knowledge Proof System.
Int. J. Netw. Secur.
22 (4) (2020)
Xiaolin Chen
,
Zhixiong Chen
,
Huaning Liu
A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}.
Int. J. Netw. Secur.
22 (4) (2020)
Yinghui Zhang
,
Xinwei Ma
,
Axin Wu
,
Fangyuan Ren
,
Dong Zheng
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices.
Int. J. Netw. Secur.
22 (4) (2020)
Cungang Yang
,
Celia Li
Secure Sharing of Data for Dynamic Group in Public Cloud.
Int. J. Netw. Secur.
22 (4) (2020)
Zhi-Ge He
Multi-Parameter and Time Series Based Trust for IoT Smart Sensors.
Int. J. Netw. Secur.
22 (4) (2020)
Fuxiao Zhou
,
Yanping Li
,
Changlu Lin
A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security.
Int. J. Netw. Secur.
22 (4) (2020)
Yi-Hui Chen
,
Li-Chin Huang
,
Iuon-Chang Lin
,
Min-Shiang Hwang
Research on the Secure Financial Surveillance Blockchain Systems.
Int. J. Netw. Secur.
22 (4) (2020)
Alain Bertrand Bomgni
,
Garrik Brel Jagho Mdemaya
An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks.
Int. J. Netw. Secur.
22 (4) (2020)
Pengshou Xie
,
Guoqiang Ma
,
Tao Feng
,
Yan Yan
,
Xue-Ming Han
Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles.
Int. J. Netw. Secur.
22 (4) (2020)
Cai-xue Zhou
Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System.
Int. J. Netw. Secur.
22 (4) (2020)
Tianhong Yang
Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography.
Int. J. Netw. Secur.
22 (4) (2020)
Yu Chen
,
Jiang-Yi Lin
,
Chin-Chen Chang
,
Yu-Chen Hu
Sharing a Secret Image in the Cloud Using Two Shadows.
Int. J. Netw. Secur.
22 (4) (2020)
Qingfeng Cheng
,
Yuting Li
,
Qi Jiang
,
Xiong Li
Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols.
Int. J. Netw. Secur.
22 (4) (2020)
Shuang-Gen Liu
,
Shi-Mei Lu
,
Rui-Wen Gong
Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m).
Int. J. Netw. Secur.
22 (4) (2020)
Linfan Wang
,
Yonghong Chen
A Perceptual Hash-based Approach to Detect Covert Timing Channels.
Int. J. Netw. Secur.
22 (4) (2020)
Hui Guo
,
Lunzhi Deng
An Identity Based Proxy Signcryption Scheme without Pairings.
Int. J. Netw. Secur.
22 (4) (2020)
Changguang Wang
,
Zimeng Dai
,
Dongmei Zhao
,
Fangwei Wang
A Novel Identity-based Authentication Scheme for IoV Security.
Int. J. Netw. Secur.
22 (4) (2020)
Chin-Chen Chang
,
Jun-Yong Chen
,
Yan-Hong Chen
,
Yanjun Liu
A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding.
Int. J. Netw. Secur.
22 (4) (2020)
Jannatul Ferdous
,
Md. Fuad Newaz Khan
,
Karim Mohammed Rezaul
,
Maruf Ahmed Tamal
,
Md. Abdul Aziz
,
Pabel Miah
A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms.
Int. J. Netw. Secur.
22 (4) (2020)
volume 22, number 5, 2020
Zhenhua Liu
,
Yan Liu
,
Jing Xu
,
Baocang Wang
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System.
Int. J. Netw. Secur.
22 (5) (2020)
Lin Mei
,
Fengli Zhang
A Distributed Density-based Outlier Detection Algorithm on Big Data.
Int. J. Netw. Secur.
22 (5) (2020)
Ming Sang Chang
,
Chih Ping Yen
Evidence Gathering of Facebook Messenger on Android.
Int. J. Netw. Secur.
22 (5) (2020)
L. Mancy
,
S. Maria Celestin Vigila
A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications.
Int. J. Netw. Secur.
22 (5) (2020)
P. R. Ancy
,
Addapalli V. N. Krishna
,
K. Balachandran
,
M. Balamurugan
,
O. S. GnanaPrakasi
Survey on Attribute-based Encryption in Cloud Computing.
Int. J. Netw. Secur.
22 (5) (2020)
Li-Chin Huang
,
Chun-Hsien Chang
,
Min-Shiang Hwang
Research on Malware Detection and Classification Based on Artificial Intelligence.
Int. J. Netw. Secur.
22 (5) (2020)
Bin Wang
An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution.
Int. J. Netw. Secur.
22 (5) (2020)
Fei Tang
,
Dong Huang
A BLS Signature Scheme from Multilinear Maps.
Int. J. Netw. Secur.
22 (5) (2020)
Li Kang
,
Leyou Zhang
A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme.
Int. J. Netw. Secur.
22 (5) (2020)
Chencheng Hu
,
Dong Zheng
,
Rui Guo
,
Axin Wu
,
Liang Wang
,
Shiyao Gao
A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks.
Int. J. Netw. Secur.
22 (5) (2020)
Seth Alornyo
,
Acheampong Edward Mensah
,
Abraham Opanfo Abbam
Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing.
Int. J. Netw. Secur.
22 (5) (2020)
Yanjun Liu
,
Chin-Chen Chang
,
Peng-Cheng Huang
One-Code-Pass User Authentication Based on QR Code and Secret Sharing.
Int. J. Netw. Secur.
22 (5) (2020)
Shoulin Yin
,
Jie Liu
,
Lin Teng
A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence.
Int. J. Netw. Secur.
22 (5) (2020)
Changsong Jiang
,
Yuhua Sun
,
Xueting Liang
Eighth Power Residue Double Circulant Self-Dual Codes.
Int. J. Netw. Secur.
22 (5) (2020)
Xiaoxu Gao
,
Leyou Zhang
Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience.
Int. J. Netw. Secur.
22 (5) (2020)
Changsong Yang
,
Xiaoling Tao
,
Qiyu Chen
New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage.
Int. J. Netw. Secur.
22 (5) (2020)
Shanshan Zhang
A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation.
Int. J. Netw. Secur.
22 (5) (2020)
Haiou Yang
,
Youliang Tian
Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique.
Int. J. Netw. Secur.
22 (5) (2020)
Jian Liu
,
Feilong Qin
Protection of User Data by Differential Privacy Algorithms.
Int. J. Netw. Secur.
22 (5) (2020)
Jinyue Bian
,
Quan Qian
Binary Executable Files Homology Detection with Genetic Algorithm.
Int. J. Netw. Secur.
22 (5) (2020)