Verifiable Digital Object Identifier
ListList
Journal/Conference List
2019 Internal Journal of Network Security Papers List
FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks
You-Jian Yu, Guang-Fu Wang, and Jie Zhao
VDOI:1816-3548-2019-00001 / Online:2019-12-07 11:35:30
Download
(25)
Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
Shidong Zhang, Tongjiang Yan, Yuhua Sun, and Lianhai Wang
VDOI:1816-3548-2019-00002 / Online:2019-12-13 11:55:25
Download
(12)
Attribute Based Encryption with Efficient Revocation from Lattices
Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, and Ting Wu
VDOI:1816-3548-2019-00003 / Online:2019-12-13 12:01:27
Download
(11)
Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
Cossi Blaise Avoussoukpo, Chunxiang Xu, and Marius Tchenagnon
VDOI:1816-3548-2019-00004 / Online:2019-12-13 12:04:43
Download
(6)
Reversible Data Hiding Scheme Based on Fully Exploiting the Orientation Combinations of Dual Stego-images
Xiaofeng Chen and Wenlong Guo
VDOI:1816-3548-2019-00005 / Online:2019-12-13 12:07:23
Download
(10)
Correlation Functions of m-Sequences of Different Lengths
Zepeng Zhuo, Jinfeng Chong, and Lei Yu
VDOI:1816-3548-2019-00006 / Online:2019-12-13 12:23:14
Download
(11)
An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain
Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, and Yang Sun
VDOI:1816-3548-2019-00007 / Online:2019-12-13 12:24:15
Download
(4)
Packet Watermarking With ECG Biological Feature
Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, and Xiangmin Guo
VDOI:1816-3548-2019-00008 / Online:2019-12-13 12:26:15
Download
(5)
Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing
Hua Ma, Guo-Hua Tian, and Lin-Chao Zhang
VDOI:1816-3548-2019-00009 / Online:2019-12-13 12:27:06
Download
(6)
A Note On One Secure Data Self-Destructing Scheme in Cloud Computing
Lihua Liu, Yang Li, Zhengjun Cao, and Zhen Chen
VDOI:1816-3548-2019-00010 / Online:2019-12-13 12:28:27
Download
(9)
Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model
Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, and Bo Meng
VDOI:1816-3548-2019-00011 / Online:2019-12-13 12:29:52
Download
(4)
Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce
Jia-Qi Wang, Yun-Feng Zhang, and Dao-Wei Liu
VDOI:1816-3548-2019-00012 / Online:2019-12-13 12:31:00
Download
(7)
Certificateless Ring Signcryption Scheme from Pairings
Hui Guo and Lunzhi Deng
VDOI:1816-3548-2019-00013 / Online:2019-12-13 12:31:49
Download
(4)
A Formal Framework of Shielding Systems by Stepwise Refinement
Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, and Yan Xiong
VDOI:1816-3548-2019-00014 / Online:2019-12-13 12:33:00
Download
(5)
StegoNote: Steganography in Guitar Music Using Note Modulation
Hui Tian, Zhaohua Zhu, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Yonghong Chen, and Yiqiao Cai
VDOI:1816-3548-2019-00015 / Online:2019-12-13 12:34:18
Download
(5)
A Modified Advanced Encryption Standard for Data Security
Lin Teng, Hang Li, Shoulin Yin, and Yang Sun
VDOI:1816-3548-2019-00016 / Online:2019-12-13 12:35:32
Download
(5)
The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks
Shahrzad Sedaghat
VDOI:1816-3548-2019-00017 / Online:2019-12-13 13:33:33
Download
(4)
A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information
Ying-Chih Tseng and Heng Ma
VDOI:1816-3548-2019-00018 / Online:2019-12-13 13:18:23
Download
(6)
Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone
Hui Xia and Weiji Yang
VDOI:1816-3548-2019-00019 / Online:2019-12-13 13:20:57
Download
(7)
A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks
Keke Wu, Bo Peng, Hua Xie, and Shaobin Zhan
VDOI:1816-3548-2019-00020 / Online:2019-12-13 14:53:10
Download
(5)
An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm
Rui-Hong Dong, Hou-Hua Yan, and Qiu-Yu Zhang
VDOI:1816-3548-2019-00021 / Online:2019-12-13 14:54:25
Download
(5)
Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing
Emmanuel Mugabo and Qiu-Yu Zhang
VDOI:1816-3548-2019-00022 / Online:2019-12-13 14:55:24
Download
(8)
A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis
Yang Chen and Yonghong Chen
VDOI:1816-3548-2019-00023 / Online:2019-12-13 14:56:17
Download
(5)
Identity Based Key-Insulated Encryption with Outsourced Equality Test
Seth Alornyo, Yanan Zhao, Guobin Zhu, and Hu Xiong
VDOI:1816-3548-2019-00024 / Online:2019-12-13 14:57:09
Download
(6)
Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group
Chu Zhao, Shoulin Yin, Hang Li, and Yang Sun
VDOI:1816-3548-2019-00025 / Online:2019-12-13 14:58:08
Download
(4)
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing
Wei-Liang Tai, Ya-Fen Chang, and Wen-Hsin Huang
VDOI:1816-3548-2019-00026 / Online:2019-12-13 14:59:06
Download
(10)
Run-based Modular Reduction Method
Zhengjun Cao, Zhen Chen, Ruizhong Wei, and Lihua Liu
VDOI:1816-3548-2019-00027 / Online:2019-12-13 15:00:13
Download
(6)
Anomaly Detection for Network Flow Using Immune Network and Density Peak
Yuanquan Shi and Hong Shen
VDOI:1816-3548-2019-00028 / Online:2019-12-13 15:01:09
Download
(10)
Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
Peng-Shou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guo-qiang Ma, and Xue-Ming Han
VDOI:1816-3548-2019-00029 / Online:2019-12-13 15:02:17
Download
(9)
Role Mining Algorithms Satisfied the Permission Cardinality Constraint
Jingyu Wang, Jingnan Dong, and Yuesheng Tan
VDOI:1816-3548-2019-00030 / Online:2019-12-13 15:03:14
Download
(11)
Refresh