Verifiable Digital Object Identifier
ListList
Journal/Conference List
2020 Internal Journal of Network Security Papers List
A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat
Javad Saadatmandan and Amirhossein Rahimi
VDOI:1816-3548-2020-00001 / Online:2020-02-09 01:28:12
Download
(55)
Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem
Hefeng Chen, Chin-Chen Chang, and Kaimeng Chen
VDOI:1816-3548-2020-00002 / Online:2020-02-09 01:45:05
Download
(60)
Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory
Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, and Elsayed Badr
VDOI:1816-3548-2020-00003 / Online:2020-02-09 01:58:57
Download
(17)
An Identity Based Proxy Signcryption Scheme without Pairings
Hui Guo and Lunzhi Deng
VDOI:1816-3548-2020-00004 / Online:2020-02-09 02:50:43
Download
(18)
Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detectione
Huijun Yao, Chaopeng Li, and Peng Sun
VDOI:1816-3548-2020-00005 / Online:2020-02-09 16:55:05
Download
(12)
A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles
Peng-Shou Xie, Xue-Ming Han, Tao Feng, Yan Yan, and Guo-Qiang Ma
VDOI:1816-3548-2020-00006 / Online:2020-02-09 16:59:37
Download
(12)
Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols
Qingfeng Cheng, Yuting Li, Qi Jiang, and Xiong Li
VDOI:1816-3548-2020-00007 / Online:2020-02-09 17:17:36
Download
(21)
Timestamp Based Detection of Sybil Attack in VANET
Syed Mohd Faisal and Taskeen Zaidi
VDOI:1816-3548-2020-00009 / Online:2020-03-01 13:13:45
Download
(11)
A Novel Approach for Component based Application Logic Event Attack Modeling
Faisal Nabi, Jianming Yong, and Xiaohui Tao
VDOI:1816-3548-2020-00010 / Online:2020-02-28 18:24:03
Download
(10)
Design of Key Management Protocols for Internet of Things
Cungang Yang and Celia Li
VDOI:1816-3548-2020-00011 / Online:2020-02-28 18:36:01
Download
(16)
Internet of Things: A Secure Cloud-based MANET Mobility Model
Tanweer Alam
VDOI:1816-3548-2020-00012 / Online:2020-02-28 19:49:11
Download
(6)
A Family of Pseudorandom Binary Sequences Derived from Generalized Cyclotomic Classes Modulo p^{m+1}q^{n+1}
Xiaolin Chen, Zhixiong Chen, and Huaning Liu
VDOI:1816-3548-2020-00013 / Online:2020-02-29 11:16:22
Download
(12)
Extension of PCL Theory and Its Application in Improved CCITT X.509 Analysis
Lei Yu, Zhi-Yao Yang, and Ze-Peng Zhuo
VDOI:1816-3548-2020-00014 / Online:2020-04-03 00:39:54
Download
(13)
A BLS Signature Scheme from Multilinear Maps
Fei Tang and Dong Huang
VDOI:1816-3548-2020-00015 / Online:2020-04-06 21:36:23
Download
(6)
Partitioned Group Password-based Authenticated Key Exchange with Privacy Protection
Hongfeng Zhu, Yuanle Zhang, Xueying Wang, and Liwei Wang
VDOI:1816-3548-2020-00016 / Online:2020-04-06 21:48:51
Download
(6)
Two Lightweight Authenticated Key Agreement Protocols Using Physically Unclonable Function with Privacy Protection
Dan Zhu, Liwei Wang, and Hongfeng Zhu
VDOI:1816-3548-2020-00017 / Online:2020-04-06 21:53:42
Download
(9)
Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm
Yanpeng Cui, Zichuan Jin, and Jianwei Hu
VDOI:1816-3548-2020-00018 / Online:2020-04-06 22:02:20
Download
(9)
Detect Fast-Flux Domain Name with DGA through IP Fluctuation
Hongling Jiang and Jinzhi Lin
VDOI:1816-3548-2020-00019 / Online:2020-04-08 21:51:55
Download
(7)
An Electronic Voting Scheme Based on LUC Secret System and Secret Sharing
Hongquan Pu, Zhe Cui, Ting Liu, Zhihan Wu, and Hongjiang Du
VDOI:1816-3548-2020-00020 / Online:2020-04-08 22:28:18
Download
(14)
A Modified Homomorphic Encryption Method for Multiple Keywords Retrieval
Xiaowei Wang, Shoulin Yin, Hang Li, Lin Teng, and Shahid Karim
VDOI:1816-3548-2020-00021 / Online:2020-04-19 13:28:40
Download
(12)
An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks
Alain Bertrand Bomgni and Garrik Brel Jagho Mdemaya
VDOI:1816-3548-2020-00022 / Online:2020-04-19 17:14:31
Download
(8)
An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing
Ze Wang, Minghua Gao, Lu Chen, and Shimin Sun
VDOI:1816-3548-2020-00023 / Online:2020-04-19 17:33:14
Download
(14)
A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, and Pabel Miah
VDOI:1816-3548-2020-00024 / Online:2020-05-02 18:41:33
Download
(11)
Binary Executable Files Homology Detection with Genetic Algorithm
Jinyue Bian and Quan Qian
VDOI:1816-3548-2020-00025 / Online:2020-05-09 11:05:31
Download
(17)
Fine-grained Identification for SSL/TLS Packets
Lingjing Kong, Ying Zhou, Guowei Huang, and Huijing Wang
VDOI:1816-3548-2020-00026 / Online:2020-07-31 18:45:15
Download
(8)
Refresh