Journal: I. J. Network Security

Volume 22, Issue 5

717 -- 727Li-Chin Huang, Chun-Hsien Chang, Min-Shiang Hwang. Research on Malware Detection and Classification Based on Artificial Intelligence
728 -- 735Fei Tang, Dong Huang. A BLS Signature Scheme from Multilinear Maps
736 -- 742Changsong Jiang, Yuhua Sun, Xueting Liang. Eighth Power Residue Double Circulant Self-Dual Codes
743 -- 751Seth Alornyo, Acheampong Edward Mensah, Abraham Opanfo Abbam. Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing
752 -- 762Yanjun Liu 0002, Chin-Chen Chang, Peng-Cheng Huang. One-Code-Pass User Authentication Based on QR Code and Secret Sharing
763 -- 774Xiaoxu Gao, Leyou Zhang. Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience
775 -- 781Lin Mei, Fengli Zhang. A Distributed Density-based Outlier Detection Algorithm on Big Data
782 -- 792Jinyue Bian, Quan Qian. Binary Executable Files Homology Detection with Genetic Algorithm
793 -- 800L. Mancy, S. Maria Celestin Vigila. A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications
801 -- 808Shanshan Zhang. A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation
809 -- 814Haiou Yang, Youliang Tian. Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique
815 -- 827Li Kang, Leyou Zhang. A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme
828 -- 837Ming-Sang Chang, Chih Ping Yen. Evidence Gathering of Facebook Messenger on Android
838 -- 844Jian Liu, Feilong Qin. Protection of User Data by Differential Privacy Algorithms
845 -- 856Zhenhua Liu, Yan Liu, Jing Xu 0022, Baocang Wang. Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System
857 -- 862Bin Wang. An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution
863 -- 868P. R. Ancy, Addapalli V. N. Krishna, K. Balachandran, M. Balamurugan, O. S. GnanaPrakasi. Survey on Attribute-based Encryption in Cloud Computing
869 -- 873Shoulin Yin, Jie Liu 0039, Lin Teng. A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence
874 -- 884Chencheng Hu, Dong Zheng 0001, Rui Guo 0005, Axin Wu, Liang Wang, Shiyao Gao. A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks
885 -- 896Changsong Yang, Xiaoling Tao, Qiyu Chen. New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage