


default search action
International Journal of Network Security, Volume 21
Volume 21, Number 1, January 2019
- Yan Wang, Xueming Ren, Shunbo Li:

2-Adic Complexity of Sequences Generated by T-Functions. 1-6 - Yang Ming, Hongping Yuan:

Fully Secure Anonymous Identity Based Broadcast Encryption with Group of Prime Order. 7-16 - Dinh-Thuan Do:

On The Secrecy Performance of Wireless Powered Device to Device Systems. 17-21 - Chunhu Li, Guangchun Luo, Chunbao Li:

An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map. 22-29 - Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita:

Granger Causality in TCP Flooding Attack. 30-39 - Dasari Kalyani, R. Sridevi:

New Hierarchical Identity Based Encryption with maximum hierarchy. 40-46 - Hossam Diab:

A Selective Self-adaptive Image Cryptosystem Based on Bit-planes Decomposition. 47-61 - Xiuxia Tian, Fuliang Tian, Anqin Zhang, Xi Chen:

Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering. 62-70 - Lijuan Guo, Xuelian Li, Juntao Gao:

Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin. 71-82 - Joshua Caleb Dagadu, Jianping Li, Emelia Opoku Aboagye, Faith K. Deynu:

Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding. 83-90 - Ahmed El-Yahyaoui, Mohamed Dafir Ech-Cherif El Kettani:

An Efficient Fully Homomorphic Encryption Scheme. 91-99 - Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, Min-Shiang Hwang:

Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. 100-104 - Mengting Hu, Hang Gao, Tiegang Gao:

Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data by Chaos Based Arithmetic Coding and Confusion. 105-114 - Bowen Zhu, Yonghong Chen, Yiqiao Cai:

Three Kinds of Network Security Situation Awareness Model Based on Big Data. 115-121 - M. Vaneeta, S. Swapna Kumar:

NPKG: Novel Pairwise Key Generation for Resisting Key-based Threats in Wireless Sensor Network. 122-129 - Ye Lu, Tao Feng:

Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing. 130-136 - Cheng Li, Zhiyong Zhang, Guoqin Chang:

Multimedia Social Network Authorization Scheme of Comparison-based Encryption. 137-144 - Subhas Chandra Sahana, Bubu Bhuyan:

A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve. 145-152 - Yunbin He:

Identification and Processing of Network Abnormal Events Based on Network Intrusion Detection Algorithm. 153-159 - Yuan Zhao, Yanyan Zhang:

Safety Protection of E-Commerce Logistics Information Data Under The Background Of Big Data. 160-165 - Bader Saeed Alghamdi, Mohamed Elnamaky, Mohammed Amer Arafah, Maazen Alsabaan, Saad Haj Bakry:

A Context Establishment Framework for Cloud Computing Information Security Risk Management Based on the STOPE View. 166-176
Volume 21, Number 2, March 2019
- Zhenhua Liu, Yaqing Fan:

Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme. 177-190 - Xueqin Zhang, Baoping Wang, Wenpeng Zhang:

A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography. 191-198 - Chen Li, Zhenhua Liu:

A Secure Privacy-Preserving Cloud Auditing Scheme with Data Deduplication. 199-210 - Yanjun Liu, Chin-Chen Chang:

A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing. 211-220 - Surmila Thokchom, Dilip Kr. Saikia:

Privacy Preserving and Public Auditable Integrity Checking on Dynamic Cloud Data. 221-229 - Wien Hong, Shuozhen Zheng, Xiaoyu Zhou:

On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism. 230-235 - Tanit Somleewong, Kiattisak Maichalernnukul:

Secure Multiple-Antenna Ultrawideband System: A Wireless Physical-Layer Security Perspective. 236-242 - Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang:

A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network. 243-249 - Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari:

Construction and Analysis of Key Generation Algorithms Based on Modified Fibonacci and Scrambling Factors for Privacy Preservation. 250-258 - Qiu-Yu Zhang, Tao Zhang, Si-Bin Qiao, Dong-Fang Wu

:
Spectrogram-based Efficient Perceptual Hashing Scheme for Speech Identification. 259-268 - Akbar Mahmoodi Rishakani, Yousef Fekri Dabanloo, Seyed Mojtaba Dehnavi, Mohammad Reza Mirzaee Shamsabad, Nasour Bagheri:

A Note on the Construction of Lightweight Cyclic MDS Matrices. 269-274 - Marwa R. Mohamed, Abdurrahman A. Nasr, Ibrahim F. Tarrad, Mohamed Z. Abdulmageed:

Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model. 275-289 - Huiyan Chen, Yanshuo Zhang, Zongjie Wan, Chenchen Zhang:

Tight Proofs of Identity-based Signatures without Random Oracle. 290-297 - Tzu-Chun Lin, Ting-Yi Yeh, Min-Shiang Hwang:

Cryptanalysis of an ID-based Deniable Threshold Ring Authentication. 298-302 - V. Sudarsan Rao, N. Satyanarayana:

A Secure and Efficient Computation Outsourcing Scheme for Multi-Users. 303-311 - Kittur P. Kibiwott, Fengli Zhang, Kimeli Victor K., Anyembe Andrew Omala, Eugene Opoku-Mensah:

Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey. 312-325 - Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel:

Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing. 326-332 - Thai-Ngoc Luong, Thanh Tu Vo:

AODVDC: An Improved Protocol Prevents Whirlwind Attacks in Mobile Ad hoc Network. 333-341 - Laura Victoria Morales Medina, David Delgado-Ruiz, Sandra Julieta Rueda:

Comprehgensive Security for Body Area Networks: A Survey. 342-354 - Qingfeng Cheng, Xinglong Zhang:

Comments on Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting. 355-358
Volume 21, Number 3, May 2019
- Zhong-Cheng Li, Jian-Hua Huang, Da-Qi Gao, Ya-Hui Jiang, Li Fan:

ISCP: An Improved Blockchain Consensus Protocol. 359-367 - Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, Yang Wang:

OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification. 368-377 - RatnaKumari Challa, VijayaKumari Gunta:

Additively LWE Based Homomorphic Encryption for Compact Devices with Enhanced Security. 378-383 - Shuang-Gen Liu, Rong-Rong Wang, Yun-Qi Li, Can-Liang Zhai:

An Improved Ternary Montgomery Ladder Algorithm on Elliptic Curves over GF(3^m). 384-391 - Feng Xiao, Di Fan, Dan Tang:

A Fast Recovery Method for Single Disk Failure Based on EVENODD. 392-401 - Chokri Nouar, Zine El Abidine Guennoun:

A Pseudo Random Bit Generator Based on a Modified Chaotic Map. 402-408 - Ashu Sharma, Sanjay Kumar Sahay:

Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy. 409-417 - Daouda Ahmat, Marayi Choroma, Tegawendé F. Bissyandé:

Multipath Key Exchange Scheme Based on the Diffie-Hellman Protocol and the Shamir Threshold. 418-427 - Gaimei Gao, Xinguang Peng, Lizhong Jin:

Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks. 428-437 - Azidine Guezzaz, Ahmed Asimi, Younes Asimi, Zakariae Tbatou, Yassine Sadqi:

A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier. 438-450 - Haichun Zhao, Xuanxia Yao, Xuefeng Zheng:

Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage. 451-461 - Sunghyuck Hong:

Authentication Techniques in the Internet of Things Environment: A Survey. 462-470 - Weimin Kang, Simiao Wang:

Virus Propagation Behavior Simulation Based on Node Movement Model of Wireless Multi-hop Network. 471-476 - Gaoxiang Lou, Zongyan Cai:

A Cloud Computing Oriented Neural Network for Resource Demands and Management Scheduling. 477-482 - Ali Mansouri, Mohamed Salim Bouhlel:

Trust in Ad Hoc Networks: A New Model Based on Clustering Algorithm. 483-493 - Xingbo Wang:

Two Number-guessing Problems Plus Applications in Cryptography. 494-500 - Dany Eka Saputra, Sarwono Sutikno, Suhono Harso Supangkat:

General Model for Secure Electronic Cash Scheme. 501-510 - Maram Bani Younes:

Secure Traffic Efficiency Control Protocol for Downtown Vehicular Networks. 511-521 - Di Fan, Feng Xiao, Dan Tang:

A New Erasure Code Decoding Algorithm. 522-529 - Yingsu Qi:

Computer Real-Time Location Forensics Method for Network Intrusion Crimes. 530-535
Volume 21, Number 4, July 2019
- Ying-Chin Chen, Kuo-Jui Wei, Jung-San Lee, Ngoc-Tu Huynh, Jyun-Hong Lin:

AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS. 537-544 - Linzhu Hu:

E-commerce Trade Consumption Payment Security and Privacy Based on Improved B2C Model. 545-550 - Tsung-Chih Hsiao, Yu-Min Huang, Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen:

Efficient Hierarchical Key Management Scheme for VR/AR Database Systems. 551-555 - Pengshou Xie, Tianxia Xiao, Hong-Jin Fan:

An Algorithm of the Privacy Security Protection Based on Location Service in the Internet of Vehicles. 556-565 - Abdullah A. Al-khatib, Mohammed A. Hassan:

Managing Computer Security, Risk Analysis and Threat Using ISO 31000: 2009: Case Study at Seiyun Community College, Yemen. 566-575 - Caixue Zhou, Xiwei Dong, Lihua Wang, Tao Li:

On the Security of a Certi ficateless Proxy Signature Scheme in the Standard Model. 576-581 - Shruti Nathani, B. P. Tripathi, Shaheena Khatoon:

A Dynamic ID Based Authenticated Group Key Agreement Protocol from Pairing. 582-591 - Juyan Li, Chunguang Ma, Lei Zhang, Qi Yuan:

Unidirectional FHPRE Scheme from Lattice for Cloud Computing. 592-600 - Shumin Xue:

Face Database Security Information Verification Based on Recognition Technology. 601-606 - Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam:

Design of an Anonymous Lightweight Communication Protocol for Smart Grid and Its Implementation on 8-bit AVR and 32-bit ARM. 607-617 - Sensen Li, Bin Yu, Yicai Huang:

A PUF-based Group Key Transfer Protocol for Bluetooth. 618-626 - Shuang-Gen Liu, Hui Zhao:

SPA Resistant Scalar Multiplication Using Pell Lucas Type Chain. 627-634 - Vladimir Galyaev, Evgenia Zykova, Dmitry Repin, Denis Bokov:

Recent Trends in Development of DDoS Attacks and Protection Systems Against Them. 635-647 - Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, Yiqiao Cai:

A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network. 648-660 - Shou-Qi Cao, Qing Sun, Liling Cao:

Security Analysis and Enhancements of A Remote User Authentication Scheme. 661-669 - Adnan Nadeem, Turki G. Alghamdi:

Detection Algorithm for Sinkhole Attack in Body Area Sensor Networks Using Local Information. 670-679 - Tao Feng, Xiaoyu Yin, Ye Lu, Junli Fang, Fenghua Li:

A Searchable CP-ABE Privacy Preserving Scheme. 680-689 - Ahmed H. Eltengy, Samaa M. Shohieb, Ali E. Takieldeen, Mohamed S. Ksasy:

Implementation, Performance and Security Analysis for CryptoBin Algorithm. 690-698 - Pengwen Lin, Yonghong Chen:

Network Security Situation Assessment Based on Text SimHash in Big Data Environment. 699-708 - Chenglian Liu, Chieh-Wen Hsu:

Comment on "Improved Secure RSA Cryptosystem (ISRSAC) for Data Confidentiality in Cloud". 709-712
Volume 21, Number 5, September 2019
- Shuang-Gen Liu, Yuan-Yuan Ding:

SPA Resistant Balanced Ternary Segmented Scalar Multiplication. 713-718 - Hui Xia, Weiji Yang:

Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants. 719-727 - Shin-Yan Chiou:

An Efficient RFID Authentication Protocol Using Dynamic Identity. 728-734 - Linbin Wen:

Security Evaluation of Computer Network Based on Hierarchy. 735-740 - Zhenhua Liu, Yuanyuan Li, Dong Yuan, Yaohui Liu:

Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction. 741-750 - Wenliang Wu:

A Novel SVD and LWT Based Robust Blind Audio Water-marking Scheme. 751-759 - Evgeny S. Sagatov, Konstantin Lovtsov, Andrei M. Sukhov:

Identifying Anomalous Geographical Routing Based on the Network Delay. 760-767 - Jinbao He, Jie Yang, Kangjian Ren, Wenjing Zhang, Guiquan Li:

Network Security Threat Detection under Big Data by Using Machine Learning. 768-773 - Liyan Wang, Juntao Gao, Xuelian Li:

Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security. 774-784 - Ikjot Saini, Sherif Saad, Arunita Jaekel:

A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks. 785-796 - Shoulin Yin, Hang Li, Lin Teng:

A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment. 797-803 - Shoulin Yin, Hang Li, Lin Teng:

A New Chi-square Distribution De-noising Method for Image Encryption. 804-811 - AbdAllah A. ElHabshy:

Augmented Hill Cipher. 812-818 - Leyou Zhang, Yujie Shang:

Leakage-resilient Attribute-based Encryption with CCA2 Security. 819-827 - Li Li, Zhengjuan Lv, Xiaohong Tong, Runhua Shi:

A Dynamic Location Privacy Protection Scheme Based on Cloud Storage. 828-834 - Nenekazi Nokuthala Penelope Mkuzangwe, Fulufhelo V. Nelwamondo:

Differentially Private Transmission Control Protocol Synchronize Packet Counts. 835-842 - Yang Sun, Shoulin Yin, Jie Liu, Lin Teng:

A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree. 843-849 - Ming Sang Chang, Chih Ping Yen:

Forensic Analysis of Social Networks Based on Instagram. 850-860 - Ou Ruan, Zihao Wang, Qingping Wang, Mingwu Zhang:

Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange. 861-871 - Jiaxiang Yang, Yanping Li, Yanli Ren:

Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server. 872-880
Volume 21, Number 6, November 2019
- Jianbin Xue, Heng Zhu, Xiaoming Liao, Zhe Su:

Joint Source-Relay Selection Scheme for Cooperative Networks under Eavesdropping Environment. 881-888 - Gao-Feng Shen, Shu-Min Gu, Daowei Liu:

An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol. 889-896 - Majid Bayat, Mohammad Beheshti-Atashgah, Morteza Barari, Mohammad Reza Aref:

Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography. 897-911 - Pengfei Fan, Yazhen Liu, Jiyang Zhu, Xiongfei Fan, Liping Wen:

Identity Management Security Authentication Based on Blockchain Technologies. 912-917 - Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin:

Secure High Capacity Data Hiding Scheme based on Reference Matrix. 918-929 - N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah:

Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks. 930-936 - Yong-bing Zhang, Qiu-Yu Zhang, Zongyi Li, Yan Yan, Mo-yi Zhang:

A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics. 937-946 - Xinpan Yuan, Songlin Wang, Cheng Peng, Chengyuan Zhang:

Efficient Near-Duplicate Document Detection Using Consistent Weighted Sampling Filter. 947-956 - Boriphat Kijjabuncha, Pipat Hiranvanichakorn:

A Provably Secure Group Authentication Protocol for Various LTE Networks. 957-970 - Putra Wanda, Huang Jin Jie:

URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks. 971-978 - Jinming Zhang:

Detection of Network Protection Security Vulnerability Intrusion Based on Data Mining. 979-984 - Latoya Jackson, Yesem Kurt Peker:

Quadrivium: A Trivium-Inspired Pseudorandom Number Generator. 985-992 - Tao Wan, Xiaochang Liu, Weichuan Liao, Nan Jiang:

Cryptanalysis and Improvement of a Smart Card Based Authentication Scheme for Multi-server Architecture Using ECC. 993-1002 - Tilei Gao, Tong Li, Rong Jiang, Ming Yang, Rui Zhu:

Research on Cloud Service Security Measurement Based on Information Entropy. 1003-1013 - Wei-Liang Tai, Ya-Fen Chang, Po-Lin Hou:

Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments. 1014-1020 - Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He, Chengyue Chang:

A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks. 1021-1030 - Ming-Yang Su, Jer-Yuan Chang, Kek-Tung Fung:

Android Malware Detection Approaches in Combination with Static and Dynamic Features. 1031-1041 - Yaling Geng, Shundong Li, Sufang Zhou:

Probabilistic RSA with Homomorphism and Its Applications. 1042-1053 - Chengbo Xu:

Cryptanalysis of An Improved Predicate Encryption Scheme from LWE. 1054-1061 - Hsieh-Tsen Pan, Eko Fajar Cahyadi, Shu-Fen Chiou, Min-Shiang Hwang:

Research on Batch Verification Schemes for Identifying Illegal Signatures. 1062-1070 - Qiong Wei, Shundong Li, Wenli Wang, Yanjing Yang:

Privacy-preserving Computational Geometry. 1071-1080

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














