Journal: I. J. Network Security

Volume 22, Issue 4

551 -- 560Yu Chen, Jiang-Yi Lin, Chin-Chen Chang 0001, Yu-Chen Hu. Sharing a Secret Image in the Cloud Using Two Shadows
561 -- 568Hui Guo, Lunzhi Deng. An Identity Based Proxy Signcryption Scheme without Pairings
569 -- 574Shuang-Gen Liu, Shi-Mei Lu, Rui-Wen Gong. Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m)
575 -- 583Chin-Chen Chang 0001, Jun-Yong Chen, Yan-Hong Chen, Yanjun Liu 0002. A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding
584 -- 588Cai-xue Zhou. Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System
589 -- 596Zhi-Ge He. Multi-Parameter and Time Series Based Trust for IoT Smart Sensors
597 -- 601Qingfeng Cheng, Yuting Li, Qi Jiang 0001, Xiong Li. Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols
602 -- 609Alain Bertrand Bomgni, Garrik Brel Jagho Mdemaya. An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks
610 -- 620Xiaolin Chen, Zhixiong Chen, Huaning Liu. A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}
621 -- 626Tianhong Yang. Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography
627 -- 637Changguang Wang, Zimeng Dai, Dongmei Zhao, Fangwei Wang. A Novel Identity-based Authentication Scheme for IoV Security
638 -- 644Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, Pabel Miah. A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
645 -- 654Fuxiao Zhou, Yanping Li, Changlu Lin. A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security
655 -- 663Pengshou Xie, Guoqiang Ma, Tao Feng, Yan Yan, Xue-Ming Han. Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles
664 -- 671Yongshuang Wei, Jianhua Chen. Tripartite Authentication Protocol RFID/NFC Based on ECC
672 -- 680Cungang Yang, Celia Li. Secure Sharing of Data for Dynamic Group in Public Cloud
681 -- 685Zhengjun Cao, Xiqi Wang, Lihua Liu. A Note on One Popular Non-Interactive Zero-Knowledge Proof System
686 -- 697Linfan Wang, Yonghong Chen. A Perceptual Hash-based Approach to Detect Covert Timing Channels
698 -- 707Yinghui Zhang 0002, Xinwei Ma, Axin Wu, Fangyuan Ren, Dong Zheng 0001. An Efficient Mobile Location-based Service Framework for Resource-constrained Devices
708 -- 716Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang. Research on the Secure Financial Surveillance Blockchain Systems