default search action
International Journal of Network Security, Volume 21
Volume 21, Number 1, January 2019
- Yan Wang, Xueming Ren, Shunbo Li:
2-Adic Complexity of Sequences Generated by T-Functions. 1-6 - Yang Ming, Hongping Yuan:
Fully Secure Anonymous Identity Based Broadcast Encryption with Group of Prime Order. 7-16 - Dinh-Thuan Do:
On The Secrecy Performance of Wireless Powered Device to Device Systems. 17-21 - Chunhu Li, Guangchun Luo, Chunbao Li:
An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map. 22-29 - Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:
Granger Causality in TCP Flooding Attack. 30-39 - Dasari Kalyani, R. Sridevi:
New Hierarchical Identity Based Encryption with maximum hierarchy. 40-46 - Hossam Diab:
A Selective Self-adaptive Image Cryptosystem Based on Bit-planes Decomposition. 47-61 - Xiuxia Tian, Fuliang Tian, Anqin Zhang, Xi Chen:
Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering. 62-70 - Lijuan Guo, Xuelian Li, Juntao Gao:
Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin. 71-82 - Joshua Caleb Dagadu, Jianping Li, Emelia Opoku Aboagye, Faith K. Deynu:
Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding. 83-90 - Ahmed El-Yahyaoui, Mohamed Dafir Ech-Cherif El Kettani:
An Efficient Fully Homomorphic Encryption Scheme. 91-99 - Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, Min-Shiang Hwang:
Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. 100-104 - Mengting Hu, Hang Gao, Tiegang Gao:
Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion. 105-114 - Bowen Zhu, Yonghong Chen, Yiqiao Cai:
Three Kinds of Network Security Situation Awareness Model Based on Big Data. 115-121 - M. Vaneeta, S. Swapna Kumar:
NPKG: Novel Pairwise Key Generation for Resisting Key-based Threats in Wireless Sensor Network. 122-129 - Ye Lu, Tao Feng:
Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing. 130-136 - Cheng Li, Zhiyong Zhang, Guoqin Chang:
Multimedia Social Network Authorization Scheme of Comparison-based Encryption. 137-144 - Subhas Chandra Sahana, Bubu Bhuyan:
A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve. 145-152 - Yunbin He:
Identification and Processing of Network Abnormal Events Based on Network Intrusion Detection Algorithm. 153-159 - Yuan Zhao, Yanyan Zhang:
Safety Protection of E-Commerce Logistics Information Data Under The Background Of Big Data. 160-165 - Bader Saeed Alghamdi, Mohamed Elnamaky, Mohammed Amer Arafah, Maazen Alsabaan, Saad Haj Bakry:
A Context Establishment Framework for Cloud Computing Information Security Risk Management Based on the STOPE View. 166-176
Volume 21, Number 2, March 2019
- Zhenhua Liu, Yaqing Fan:
Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme. 177-190 - Xueqin Zhang, Baoping Wang, Wenpeng Zhang:
A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography. 191-198 - Chen Li, Zhenhua Liu:
A Secure Privacy-Preserving Cloud Auditing Scheme with Data Deduplication. 199-210 - Yanjun Liu, Chin-Chen Chang:
A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing. 211-220 - Surmila Thokchom, Dilip Kr. Saikia:
Privacy Preserving and Public Auditable Integrity Checking on Dynamic Cloud Data. 221-229 - Wien Hong, Shuozhen Zheng, Xiaoyu Zhou:
On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism. 230-235 - Tanit Somleewong, Kiattisak Maichalernnukul:
Secure Multiple-Antenna Ultrawideband System: A Wireless Physical-Layer Security Perspective. 236-242 - Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang:
A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network. 243-249 - Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari:
Construction and Analysis of Key Generation Algorithms Based on Modified Fibonacci and Scrambling Factors for Privacy Preservation. 250-258 - Qiu-Yu Zhang, Tao Zhang, Si-Bin Qiao, Dong-Fang Wu:
Spectrogram-based Efficient Perceptual Hashing Scheme for Speech Identification. 259-268 - Akbar Mahmoodi Rishakani, Yousef Fekri Dabanloo, Seyed Mojtaba Dehnavi, Mohammad Reza Mirzaee Shamsabad, Nasour Bagheri:
A Note on the Construction of Lightweight Cyclic MDS Matrices. 269-274 - Marwa R. Mohamed, Abdurrahman A. Nasr, Ibrahim F. Tarrad, Mohamed Z. Abdulmageed:
Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model. 275-289 - Huiyan Chen, Yanshuo Zhang, Zongjie Wan, Chenchen Zhang:
Tight Proofs of Identity-based Signatures without Random Oracle. 290-297 - Tzu-Chun Lin, Ting-Yi Yeh, Min-Shiang Hwang:
Cryptanalysis of an ID-based Deniable Threshold Ring Authentication. 298-302 - V. Sudarsan Rao, N. Satyanarayana:
A Secure and Efficient Computation Outsourcing Scheme for Multi-Users. 303-311 - Kittur P. Kibiwott, Fengli Zhang, Kimeli Victor K., Anyembe Andrew Omala, Eugene Opoku-Mensah:
Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey. 312-325 - Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel:
Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing. 326-332 - Thai-Ngoc Luong, Thanh Tu Vo:
AODVDC: An Improved Protocol Prevents Whirlwind Attacks in Mobile Ad hoc Network. 333-341 - Laura Victoria Morales Medina, David Delgado-Ruiz, Sandra Julieta Rueda:
Comprehgensive Security for Body Area Networks: A Survey. 342-354 - Qingfeng Cheng, Xinglong Zhang:
Comments on Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting. 355-358
Volume 21, Number 3, May 2019
- Zhong-Cheng Li, Jian-Hua Huang, Da-Qi Gao, Ya-Hui Jiang, Li Fan:
ISCP: An Improved Blockchain Consensus Protocol. 359-367 - Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, Yang Wang:
OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification. 368-377 - RatnaKumari Challa, VijayaKumari Gunta:
Additively LWE Based Homomorphic Encryption for Compact Devices with Enhanced Security. 378-383 - Shuang-Gen Liu, Rong-Rong Wang, Yun-Qi Li, Can-Liang Zhai:
An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m). 384-391 - Feng Xiao, Di Fan, Dan Tang:
A Fast Recovery Method for Single Disk Failure Based on EVENODD. 392-401 - Chokri Nouar, Zine El Abidine Guennoun:
A Pseudo Random Bit Generator Based on a Modified Chaotic Map. 402-408 - Ashu Sharma, Sanjay Kumar Sahay:
Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy. 409-417 - Daouda Ahmat, Marayi Choroma, Tegawendé F. Bissyandé:
Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold. 418-427 - Gaimei Gao, Xinguang Peng, Lizhong Jin:
Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks. 428-437 - Azidine Guezzaz, Ahmed Asimi, Younes Asimi, Zakariae Tbatou, Yassine Sadqi:
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier. 438-450 - Haichun Zhao, Xuanxia Yao, Xuefeng Zheng:
Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage. 451-461 - Sunghyuck Hong:
Authentication Techniques in the Internet of Things Environment: A Survey. 462-470 - Weimin Kang, Simiao Wang:
Virus Propagation Behavior Simulation Based on Node Movement Model of Wireless Multi-hop Network. 471-476 - Gaoxiang Lou, Zongyan Cai:
A Cloud Computing Oriented Neural Network for Resource Demands and Management Scheduling. 477-482 - Ali Mansouri, Mohamed Salim Bouhlel:
Trust in Ad Hoc Networks: A New Model Based on Clustering Algorithm. 483-493 - Xingbo Wang:
Two Number-guessing Problems Plus Applications in Cryptography. 494-500 - Dany Eka Saputra, Sarwono Sutikno, Suhono Harso Supangkat:
General Model for Secure Electronic Cash Scheme. 501-510 - Maram Bani Younes:
Secure Traffic Efficiency Control Protocol for Downtown Vehicular Networks. 511-521 - Di Fan, Feng Xiao, Dan Tang:
A New Erasure Code Decoding Algorithm. 522-529 - Yingsu Qi:
Computer Real-Time Location Forensics Method for Network Intrusion Crimes. 530-535
Volume 21, Number 4, July 2019
- Ying-Chin Chen, Kuo-Jui Wei, Jung-San Lee, Ngoc-Tu Huynh, Jyun-Hong Lin:
AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS. 537-544 - Linzhu Hu:
E-commerce Trade Consumption Payment Security and Privacy Based on Improved B2C Model. 545-550 - Tsung-Chih Hsiao, Yu-Min Huang, Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen:
Efficient Hierarchical Key Management Scheme for VR/AR Database Systems. 551-555 - Pengshou Xie, Tianxia Xiao, Hong-Jin Fan:
An Algorithm of the Privacy Security Protection Based on Location Service in the Internet of Vehicles. 556-565 - Abdullah A. Al-khatib, Mohammed A. Hassan:
Managing Computer Security, Risk Analysis and Threat Using ISO 31000: 2009: Case Study at Seiyun Community College, Yemen. 566-575 - Caixue Zhou, Xiwei Dong, Lihua Wang, Tao Li:
On the Security of a Certi ficateless Proxy Signature Scheme in the Standard Model. 576-581 - Shruti Nathani, B. P. Tripathi, Shaheena Khatoon:
A Dynamic ID Based Authenticated Group Key Agreement Protocol from Pairing. 582-591 - Juyan Li, Chunguang Ma, Lei Zhang, Qi Yuan:
Unidirectional FHPRE Scheme from Lattice for Cloud Computing. 592-600 - Shumin Xue:
Face Database Security Information Verification Based on Recognition Technology. 601-606 - Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam:
Design of an Anonymous Lightweight Communication Protocol for Smart Grid and Its Implementation on 8-bit AVR and 32-bit ARM. 607-617 - Sensen Li, Bin Yu, Yicai Huang:
A PUF-based Group Key Transfer Protocol for Bluetooth. 618-626 - Shuang-Gen Liu, Hui Zhao:
SPA Resistant Scalar Multiplication Using Pell Lucas Type Chain. 627-634 - Vladimir Galyaev, Evgenia Zykova, Dmitry Repin, Denis Bokov:
Recent Trends in Development of DDoS Attacks and Protection Systems Against Them. 635-647 - Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:
A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network. 648-660 - Shou-Qi Cao, Qing Sun, Liling Cao:
Security Analysis and Enhancements of A Remote User Authentication Scheme. 661-669 - Adnan Nadeem, Turki G. Alghamdi:
Detection Algorithm for Sinkhole Attack in Body Area Sensor Networks Using Local Information. 670-679 - Tao Feng, Xiaoyu Yin, Ye Lu, Junli Fang, Fenghua Li:
A Searchable CP-ABE Privacy Preserving Scheme. 680-689 - Ahmed H. Eltengy, Samaa M. Shohieb, Ali E. Takieldeen, Mohamed S. Ksasy:
Implementation, Performance and Security Analysis for CryptoBin Algorithm. 690-698 - Pengwen Lin, Yonghong Chen:
Network Security Situation Assessment Based on Text SimHash in Big Data Environment. 699-708 - Chenglian Liu, Chieh-Wen Hsu:
Comment on "Improved Secure RSA Cryptosystem (ISRSAC) for Data Confidentiality in Cloud". 709-712
Volume 21, Number 5, September 2019
- Shuang-Gen Liu, Yuan-Yuan Ding:
SPA Resistant Balanced Ternary Segmented Scalar Multiplication. 713-718 - Hui Xia, Weiji Yang:
Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants. 719-727 - Shin-Yan Chiou:
An Efficient RFID Authentication Protocol Using Dynamic Identity. 728-734 - Linbin Wen:
Security Evaluation of Computer Network Based on Hierarchy. 735-740 - Zhenhua Liu, Yuanyuan Li, Dong Yuan, Yaohui Liu:
Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction. 741-750 - Wenliang Wu:
A Novel SVD and LWT Based Robust Blind Audio Water-marking Scheme. 751-759 - Evgeny S. Sagatov, Konstantin Lovtsov, Andrei M. Sukhov:
Identifying Anomalous Geographical Routing Based on the Network Delay. 760-767 - Jinbao He, Jie Yang, Kangjian Ren, Wenjing Zhang, Guiquan Li:
Network Security Threat Detection under Big Data by Using Machine Learning. 768-773 - Liyan Wang, Juntao Gao, Xuelian Li:
Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security. 774-784 - Ikjot Saini, Sherif Saad, Arunita Jaekel:
A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks. 785-796 - Shoulin Yin, Hang Li, Lin Teng:
A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment. 797-803 - Shoulin Yin, Hang Li, Lin Teng:
A New Chi-square Distribution De-noising Method for Image Encryption. 804-811 - AbdAllah A. ElHabshy:
Augmented Hill Cipher. 812-818 - Leyou Zhang, Yujie Shang:
Leakage-resilient Attribute-based Encryption with CCA2 Security. 819-827 - Li Li, Zhengjuan Lv, Xiaohong Tong, Runhua Shi:
A Dynamic Location Privacy Protection Scheme Based on Cloud Storage. 828-834 - Nenekazi Nokuthala Penelope Mkuzangwe, Fulufhelo V. Nelwamondo:
Differentially Private Transmission Control Protocol Synchronize Packet Counts. 835-842 - Yang Sun, Shoulin Yin, Jie Liu, Lin Teng:
A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree. 843-849 - Ming Sang Chang, Chih Ping Yen:
Forensic Analysis of Social Networks Based on Instagram. 850-860 - Ou Ruan, Zihao Wang, Qingping Wang, Mingwu Zhang:
Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange. 861-871 - Jiaxiang Yang, Yanping Li, Yanli Ren:
Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server. 872-880
Volume 21, Number 6, November 2019
- Jianbin Xue, Heng Zhu, Xiaoming Liao, Zhe Su:
Joint Source-Relay Selection Scheme for Cooperative Networks under Eavesdropping Environment. 881-888 - Gao-Feng Shen, Shu-Min Gu, Daowei Liu:
An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol. 889-896 - Majid Bayat, Mohammad Beheshti-Atashgah, Morteza Barari, Mohammad Reza Aref:
Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography. 897-911 - Pengfei Fan, Yazhen Liu, Jiyang Zhu, Xiongfei Fan, Liping Wen:
Identity Management Security Authentication Based on Blockchain Technologies. 912-917 - Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin:
Secure High Capacity Data Hiding Scheme based on Reference Matrix. 918-929 - N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah:
Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks. 930-936 - Yong-bing Zhang, Qiu-Yu Zhang, Zongyi Li, Yan Yan, Mo-yi Zhang:
A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics. 937-946 - Xinpan Yuan, Songlin Wang, Cheng Peng, Chengyuan Zhang:
Efficient Near-Duplicate Document Detection Using Consistent Weighted Sampling Filter. 947-956 - Boriphat Kijjabuncha, Pipat Hiranvanichakorn:
A Provably Secure Group Authentication Protocol for Various LTE Networks. 957-970 - Putra Wanda, Huang Jin Jie:
URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks. 971-978 - Jinming Zhang:
Detection of Network Protection Security Vulnerability Intrusion Based on Data Mining. 979-984 - Latoya Jackson, Yesem Kurt Peker:
Quadrivium: A Trivium-Inspired Pseudorandom Number Generator. 985-992 - Tao Wan, Xiaochang Liu, Weichuan Liao, Nan Jiang:
Cryptanalysis and Improvement of a Smart Card Based Authentication Scheme for Multi-server Architecture Using ECC. 993-1002 - Tilei Gao, Tong Li, Rong Jiang, Ming Yang, Rui Zhu:
Research on Cloud Service Security Measurement Based on Information Entropy. 1003-1013 - Wei-Liang Tai, Ya-Fen Chang, Po-Lin Hou:
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments. 1014-1020 - Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He, Chengyue Chang:
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks. 1021-1030 - Ming-Yang Su, Jer-Yuan Chang, Kek-Tung Fung:
Android Malware Detection Approaches in Combination with Static and Dynamic Features. 1031-1041 - Yaling Geng, Shundong Li, Sufang Zhou:
Probabilistic RSA with Homomorphism and Its Applications. 1042-1053 - Chengbo Xu:
Cryptanalysis of An Improved Predicate Encryption Scheme from LWE. 1054-1061 - Hsieh-Tsen Pan, Eko Fajar Cahyadi, Shu-Fen Chiou, Min-Shiang Hwang:
Research on Batch Verification Schemes for Identifying Illegal Signatures. 1062-1070 - Qiong Wei, Shundong Li, Wenli Wang, Yanjing Yang:
Privacy-preserving Computational Geometry. 1071-1080
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.