Verifiable Digital Object Identifier
List
Journals
Search
Journal/Conference:
All
Internal Journal of Network Security
Journal of Electronic Science and Technology
Year:
All
2019
2020
2021
2022
Article Title:
Author:
VDOI ID:
Search
Cancel
Journal/Conference List
Internal Journal of Network Security
2022 (37)
2021 (11)
2020 (25)
2019 (56)
Journal of Electronic Science and Technology
2019 (16)
2020 Internal Journal of Network Security Papers List
A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat
Javad Saadatmandan and Amirhossein Rahimi
VDOI:1816-3548-2020-00001 / Online:2020-02-09 01:28:12
(55)
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem
Hefeng Chen, Chin-Chen Chang, and Kaimeng Chen
VDOI:1816-3548-2020-00002 / Online:2020-02-09 01:45:05
(60)
Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory
Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, and Elsayed Badr
VDOI:1816-3548-2020-00003 / Online:2020-02-09 01:58:57
(17)
An Identity Based Proxy Signcryption Scheme without Pairings
Hui Guo and Lunzhi Deng
VDOI:1816-3548-2020-00004 / Online:2020-02-09 02:50:43
(18)
Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detectione
Huijun Yao, Chaopeng Li, and Peng Sun
VDOI:1816-3548-2020-00005 / Online:2020-02-09 16:55:05
(12)
A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles
Peng-Shou Xie, Xue-Ming Han, Tao Feng, Yan Yan, and Guo-Qiang Ma
VDOI:1816-3548-2020-00006 / Online:2020-02-09 16:59:37
(12)
Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols
Qingfeng Cheng, Yuting Li, Qi Jiang, and Xiong Li
VDOI:1816-3548-2020-00007 / Online:2020-02-09 17:17:36
(21)
Timestamp Based Detection of Sybil Attack in VANET
Syed Mohd Faisal and Taskeen Zaidi
VDOI:1816-3548-2020-00009 / Online:2020-03-01 13:13:45
(11)
A Novel Approach for Component based Application Logic Event Attack Modeling
Faisal Nabi, Jianming Yong, and Xiaohui Tao
VDOI:1816-3548-2020-00010 / Online:2020-02-28 18:24:03
(10)
Design of Key Management Protocols for Internet of Things
Cungang Yang and Celia Li
VDOI:1816-3548-2020-00011 / Online:2020-02-28 18:36:01
(16)
Internet of Things: A Secure Cloud-based MANET Mobility Model
Tanweer Alam
VDOI:1816-3548-2020-00012 / Online:2020-02-28 19:49:11
(6)
A Family of Pseudorandom Binary Sequences Derived from Generalized Cyclotomic Classes Modulo p^{m+1}q^{n+1}
Xiaolin Chen, Zhixiong Chen, and Huaning Liu
VDOI:1816-3548-2020-00013 / Online:2020-02-29 11:16:22
(12)
Extension of PCL Theory and Its Application in Improved CCITT X.509 Analysis
Lei Yu, Zhi-Yao Yang, and Ze-Peng Zhuo
VDOI:1816-3548-2020-00014 / Online:2020-04-03 00:39:54
(13)
A BLS Signature Scheme from Multilinear Maps
Fei Tang and Dong Huang
VDOI:1816-3548-2020-00015 / Online:2020-04-06 21:36:23
(6)
Partitioned Group Password-based Authenticated Key Exchange with Privacy Protection
Hongfeng Zhu, Yuanle Zhang, Xueying Wang, and Liwei Wang
VDOI:1816-3548-2020-00016 / Online:2020-04-06 21:48:51
(6)
Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
Dan Zhu, Liwei Wang, and Hongfeng Zhu
VDOI:1816-3548-2020-00017 / Online:2020-04-06 21:53:42
(9)
Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm
Yanpeng Cui, Zichuan Jin, and Jianwei Hu
VDOI:1816-3548-2020-00018 / Online:2020-04-06 22:02:20
(9)
Detect Fast-Flux Domain Name with DGA through IP Fluctuation
Hongling Jiang and Jinzhi Lin
VDOI:1816-3548-2020-00019 / Online:2020-04-08 21:51:55
(7)
An Electronic Voting Scheme Based on LUC Secret System and Secret Sharing
Hongquan Pu, Zhe Cui, Ting Liu, Zhihan Wu, and Hongjiang Du
VDOI:1816-3548-2020-00020 / Online:2020-04-08 22:28:18
(14)
A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval
Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim
VDOI:1816-3548-2020-00021 / Online:2020-04-19 13:28:40
(12)
An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks
Alain Bertrand Bomgni and Garrik Brel Jagho Mdemaya
VDOI:1816-3548-2020-00022 / Online:2020-04-19 17:14:31
(8)
An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing
Ze Wang, Minghua Gao, Lu Chen, and Shimin Sun
VDOI:1816-3548-2020-00023 / Online:2020-04-19 17:33:14
(14)
A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, and Pabel Miah
VDOI:1816-3548-2020-00024 / Online:2020-05-02 18:41:33
(11)
Binary Executable Files Homology Detection with Genetic Algorithm
Jinyue Bian and Quan Qian
VDOI:1816-3548-2020-00025 / Online:2020-05-09 11:05:31
(17)
Fine-grained Identification for SSL/TLS Packets
Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang
VDOI:1816-3548-2020-00026 / Online:2020-07-31 18:45:15
(8)
1
COPYRIGHT Prof. Min-Shiang Hwang ALL RIGHTS RESERVED
Best resolution: 1360 x 768