Verifiable Digital Object Identifier
ListList
Journal/Conference List
2022 Internal Journal of Network Security Papers List
Improving the Efficiency of Point Arithmetic on Elliptic Curves Using ARM Processors and NEON
Pham Van Luc, Hoang Dang Hai, and Leu Duc Tan
VDOI:1816-3548-2022-00001 / Online:2022-02-14 22:42:43
Download
(17)
An Improved Three-Factor Remote User Authentication Protocol Using Elliptic Curve Cryptography
Wan-Rong Liu, Bin Li, and Zhi-Yong Ji
VDOI:1816-3548-2022-00002 / Online:2022-03-26 13:13:07
Download
(7)
Fine-grained Access Control Scheme Supporting Cloud-assisted Write Permission Control in Cloud-aided E-Health System
Kai He, Ziqi Wang, Jiaoli Shi, Anyuan Deng, and Shunlin Lv
VDOI:1816-3548-2022-00003 / Online:2022-04-02 11:42:41
Download
(2)
Comparative Attribute Access Control Scheme Based on Spatio-temporal Constraints in Cloud
Junling Zhang, Ze Wang, Ping Zhao, Minghua Gao, and Shimin Sun
VDOI:1816-3548-2022-00004 / Online:2022-04-09 12:29:18
Download
(5)
A Trust Assessment Mechanism of the IoV Based on Multi-factor Analytic Hierarchy Process
Peng-Shou Xie, Xin Tong, Hong Wang, Ying-Wen Zhao, Tao Feng, and Yan Yan
VDOI:1816-3548-2022-00005 / Online:2022-04-09 12:32:17
Download
Ciphertext-Policy Attribute-Based Encryption Against Post-challenge Continuous Auxiliary Inputs Leakage
Yuyan Guo, Zhenhua Lu, Mingming Jiang, and Dongbing Zhang
VDOI:1816-3548-2022-00006 / Online:2022-04-09 12:38:35
Download
Adversarial Examples Generation Method for Chinese Text Classification
En-Hui Xu, Xiao-Lin Zhang, Yong-Ping Wang, Shuai Zhang, Li-Xin Liu, and Li Xu
VDOI:1816-3548-2022-00007 / Online:2022-04-10 08:49:17
Download
Collusion Resistance CP-ABE Scheme with Accountability, Revocation and Privacy Preserving for Cloud-based E-health System
Zhenhua Liu, Yingying Ding, Ming Yuan, and Baocang Wang
VDOI:1816-3548-2022-00008 / Online:2022-04-11 13:13:14
Download
Analysis of Two Outsourcing Algorithms for Solving Quadratic Congruence
Lihua Liu and Yujie Li
VDOI:1816-3548-2022-00009 / Online:2022-04-11 13:17:12
Download
Analysis of Policy Anomalies in Distributed Firewalls
Yu-Zhu Cheng and Qiu-ying Shi
VDOI:1816-3548-2022-00010 / Online:2022-04-11 13:20:16
Download
(10)
A Statistical P2P Botnet Detection Resilient to Mimicry Attacks
Fateme Faraji Daneshgar, Atiye Mohammadkhani, and Maghsoud Abbaspour
VDOI:1816-3548-2022-00011 / Online:2022-04-23 13:35:04
Download
(5)
An Assessment Method of Internet of Vehicles User Behavior Based on Hidden Markov Model
Peng-Shou Xie, Yi-Fan Wang, Zong-Liang Wang, Nan-Nan Li, Tao Feng, and Yan Yan
VDOI:1816-3548-2022-00012 / Online:2022-04-23 13:37:56
Download
Formal Security Analysis of OPC UA Protocol in Industrial Control System
Tao Feng, Zhuang-yu Ma, and Jun-li Fang
VDOI:1816-3548-2022-00013 / Online:2022-04-23 13:41:08
Download
Stable Transmission Algorithm for 5G Wireless Sensor Networks Based on Energy Equalization-delay Reduction Mechanism
Bo Wu
VDOI:1816-3548-2022-00014 / Online:2022-04-23 13:43:31
Download
A Lightweight NFC Authentication Algorithm Based on Modified Hash Function
Fang-Ming Cao and Dao-Wei Liu
VDOI:1816-3548-2022-00015 / Online:2022-04-23 13:45:25
Download
On the Linear Complexity of Binary Half-l-Sequences
Zhihua Niu and Yuqi Sang
VDOI:1816-3548-2022-00016 / Online:2022-04-23 13:48:03
Download
Conditional Privacy-Preserving Authentication Scheme for IoV Based on ECC
Peng-Shou Xie, Xiao-Jie Pan, Hong Wang, Jia-Lu Wang, Tao Feng, and Yan Yan
VDOI:1816-3548-2022-00017 / Online:2022-04-23 13:49:59
Download
An Adaptive Speech Homomorphic Encryption Scheme Based on Energy in Cloud Storage
Qiu-Yu Zhang and Yu-Jiao Ba
VDOI:1816-3548-2022-00018 / Online:2022-04-23 13:52:07
Download
(3)
Quantum Synchronizable Codes From Sextic Cyclotomy
Tao Wang, Xueting Wang, Qian Liu, and Tongjiang Yan
VDOI:1816-3548-2022-00019 / Online:2022-05-01 13:15:53
Download
Adaptive Intrusion Detection Model Based on CNN and C5.0 Classifier
Wen-Tao Hao, Ye Lu, Rui-Hong Dong, Yong-Li Shui, and Qiu-Yu Zhang
VDOI:1816-3548-2022-00020 / Online:2022-05-01 13:18:52
Download
(3)
An Efficient and Secure Identity-based Conditional Privacy-Preserving Scheme in VANETs
Xianglong Wang, Qiuting Chen, Zhenwan Peng, and Yimin Wang
VDOI:1816-3548-2022-00021 / Online:2022-05-01 13:21:36
Download
A Fully Secure Identity Based Encryption Scheme with Equality Test in The Standard Model in Cloud Computing
Zijun Zhou, Yongjian Liao, Ganglin Zhang, Tingyun Gan, and Shijie Zhou
VDOI:1816-3548-2022-00022 / Online:2022-05-01 13:24:21
Download
An Adaptive Multi-Layer Architecture for IoT based IDPS for Attacks using Deep Learning Method
Sirajuddin Qureshi, Jingsha He, Saima Tunio, Nafei Zhu, Faheem Ullah, Ahsan Nazir, and Ahsan Wajahat
VDOI:1816-3548-2022-00023 / Online:2022-05-09 10:15:07
Download
(4)
A Note on Two Outsourcing Algorithms of Modular Exponentiations
Xinlei Qi, Yunhai Zheng, and Chengliang Tian
VDOI:1816-3548-2022-00024 / Online:2022-05-09 11:23:45
Download
(5)
Research on Rough Set Theory for Mobile Fraud Detection
Jinming Ma, Tianbing Xia, and Janusz Getta
VDOI:1816-3548-2022-00025 / Online:2022-07-03 10:31:01
Download
A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
Zhiyong Luo, Rui Xu, Jianming Wang, and Weicheng Zhu
VDOI:1816-3548-2022-00026 / Online:2022-07-03 10:34:30
Download
An Efficient Privacy-Preserving Data Aggregation Scheme without Trusted Authority in Smart Grid
Xinyu Zhao, Jinguo Li, Na Zhao, and Ping Meng
VDOI:1816-3548-2022-00027 / Online:2022-07-03 10:38:26
Download
An Efficient Heterogeneous Ring Signature Scheme
Caixue Zhou
VDOI:1816-3548-2022-00028 / Online:2022-07-03 10:41:25
Download
Speech Encryption Scheme Based on BFV Homomorphic Encryption
Qiuyu Zhang, Yujiao Ba, Yingjie Hu, Zhenyu Zhao, and Yugui Jia
VDOI:1816-3548-2022-00029 / Online:2022-07-03 10:45:20
Download
A Note on One Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
Lihua Liu and Zhengjun Cao
VDOI:1816-3548-2022-00030 / Online:2022-07-03 10:48:30
Download
Refresh