- Hui Guo, Lunzhi Deng:
An Identity Based Proxy Signcryption Scheme without Pairings. Int. J. Netw. Secur. 22(4): 561-568 (2020) - Zhi-Ge He:
Multi-Parameter and Time Series Based Trust for IoT Smart Sensors. Int. J. Netw. Secur. 22(4): 589-596 (2020) - Xiaoyi Hong:
Network Security Situation Prediction Based on Grey Relational Analysis and Support Vector Machine Algorithm. Int. J. Netw. Secur. 22(1): 177-182 (2020) - Chencheng Hu, Dong Zheng, Rui Guo, Axin Wu, Liang Wang, Shiyao Gao:
A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks. Int. J. Netw. Secur. 22(5): 874-884 (2020) - Li-Chin Huang, Chun-Hsien Chang, Min-Shiang Hwang:
Research on Malware Detection and Classification Based on Artificial Intelligence. Int. J. Netw. Secur. 22(5): 717-727 (2020) - Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:
Static Analysis of Superfluous Network Transmissions in Android Applications. Int. J. Netw. Secur. 22(3): 409-418 (2020) - Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications. Int. J. Netw. Secur. 22(3): 381-391 (2020) - Munawar Hussain, Jiadong Ren, Awais Akram:
Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network. Int. J. Netw. Secur. 22(3): 540-547 (2020) - Changsong Jiang, Yuhua Sun, Xueting Liang:
Eighth Power Residue Double Circulant Self-Dual Codes. Int. J. Netw. Secur. 22(5): 736-742 (2020) - Li Kang, Leyou Zhang:
A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme. Int. J. Netw. Secur. 22(5): 815-827 (2020) - Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang:
One-Code-Pass User Authentication Based on QR Code and Secret Sharing. Int. J. Netw. Secur. 22(5): 752-762 (2020) - Yang Liu, Mingxing He, Fangyuan Pu:
Anonymous Transaction of Digital Currency Based on Blockchain. Int. J. Netw. Secur. 22(3): 442-448 (2020) - Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen:
A Note On One Secure Data Self-Destructing Scheme In Cloud Computing. Int. J. Netw. Secur. 22(1): 36-40 (2020) - Shuang-Gen Liu, Shi-Mei Lu, Rui-Wen Gong:
Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3m). Int. J. Netw. Secur. 22(4): 569-574 (2020) - Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System. Int. J. Netw. Secur. 22(5): 845-856 (2020) - Jian Liu, Feilong Qin:
Protection of User Data by Differential Privacy Algorithms. Int. J. Netw. Secur. 22(5): 838-844 (2020) - Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, Bo Meng:
Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model. Int. J. Netw. Secur. 22(1): 80-92 (2020) - Hua Ma, Guohua Tian, Linchao Zhang:
Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing. Int. J. Netw. Secur. 22(1): 24-35 (2020) - L. Mancy, S. Maria Celestin Vigila:
A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications. Int. J. Netw. Secur. 22(5): 793-800 (2020) - Lin Mei, Fengli Zhang:
A Distributed Density-based Outlier Detection Algorithm on Big Data. Int. J. Netw. Secur. 22(5): 775-781 (2020) - Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, Yang Sun:
An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain. Int. J. Netw. Secur. 22(1): 155-160 (2020) - Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, Elsayed M. Badr:
Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory. Int. J. Netw. Secur. 22(2): 283-295 (2020) - Emmanuel Mugabo, Qiu-Yu Zhang:
Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing. Int. J. Netw. Secur. 22(2): 231-241 (2020) - Faisal Nabi, Jianming Yong, Xiaohui Tao:
A Novel Approach for Component based Application Logic Event Attack Modeling. Int. J. Netw. Secur. 22(3): 435-441 (2020) - Hsieh-Tsen Pan, Hung-Wei Yang, Min-Shiang Hwang:
An Enhanced Secure Smart Card-based Password Authentication Scheme. Int. J. Netw. Secur. 22(2): 358-363 (2020) - Javad Saadatmandan, Amirhossein Rahimi:
A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat. Int. J. Netw. Secur. 22(2): 250-256 (2020) - Shahrzad Sedaghat:
The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks. Int. J. Netw. Secur. 22(1): 41-53 (2020) - Yuanquan Shi, Hong Shen:
Anomaly Detection for Network Flow Using Immune Network and Density Peak. Int. J. Netw. Secur. 22(2): 337-346 (2020) - Yueyang Su, Jing Wan, Junkai Yi:
A PSO-based Wavelet-core ELM for Abnormal Flow Detection. Int. J. Netw. Secur. 22(2): 306-313 (2020) - Wei-Liang Tai, Ya-Fen Chang, Wen-Hsin Huang:
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing. Int. J. Netw. Secur. 22(2): 212-217 (2020)