Journal: I. J. Network Security

Volume 22, Issue 5

717 -- 727Li-Chin Huang, Chun-Hsien Chang, Min-Shiang Hwang. Research on Malware Detection and Classification Based on Artificial Intelligence
728 -- 735Fei Tang, Dong Huang. A BLS Signature Scheme from Multilinear Maps
736 -- 742Changsong Jiang, Yuhua Sun, Xueting Liang. Eighth Power Residue Double Circulant Self-Dual Codes
743 -- 751Seth Alornyo, Acheampong Edward Mensah, Abraham Opanfo Abbam. Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing
752 -- 762Yanjun Liu 0002, Chin-Chen Chang, Peng-Cheng Huang. One-Code-Pass User Authentication Based on QR Code and Secret Sharing
763 -- 774Xiaoxu Gao, Leyou Zhang. Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience
775 -- 781Lin Mei, Fengli Zhang. A Distributed Density-based Outlier Detection Algorithm on Big Data
782 -- 792Jinyue Bian, Quan Qian. Binary Executable Files Homology Detection with Genetic Algorithm
793 -- 800L. Mancy, S. Maria Celestin Vigila. A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications
801 -- 808Shanshan Zhang. A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation
809 -- 814Haiou Yang, Youliang Tian. Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique
815 -- 827Li Kang, Leyou Zhang. A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme
828 -- 837Ming-Sang Chang, Chih Ping Yen. Evidence Gathering of Facebook Messenger on Android
838 -- 844Jian Liu, Feilong Qin. Protection of User Data by Differential Privacy Algorithms
845 -- 856Zhenhua Liu, Yan Liu, Jing Xu 0022, Baocang Wang. Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System
857 -- 862Bin Wang. An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution
863 -- 868P. R. Ancy, Addapalli V. N. Krishna, K. Balachandran, M. Balamurugan, O. S. GnanaPrakasi. Survey on Attribute-based Encryption in Cloud Computing
869 -- 873Shoulin Yin, Jie Liu 0039, Lin Teng. A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence
874 -- 884Chencheng Hu, Dong Zheng 0001, Rui Guo 0005, Axin Wu, Liang Wang, Shiyao Gao. A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks
885 -- 896Changsong Yang, Xiaoling Tao, Qiyu Chen. New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage

Volume 22, Issue 4

551 -- 560Yu Chen, Jiang-Yi Lin, Chin-Chen Chang 0001, Yu-Chen Hu. Sharing a Secret Image in the Cloud Using Two Shadows
561 -- 568Hui Guo, Lunzhi Deng. An Identity Based Proxy Signcryption Scheme without Pairings
569 -- 574Shuang-Gen Liu, Shi-Mei Lu, Rui-Wen Gong. Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m)
575 -- 583Chin-Chen Chang 0001, Jun-Yong Chen, Yan-Hong Chen, Yanjun Liu 0002. A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding
584 -- 588Cai-xue Zhou. Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System
589 -- 596Zhi-Ge He. Multi-Parameter and Time Series Based Trust for IoT Smart Sensors
597 -- 601Qingfeng Cheng, Yuting Li, Qi Jiang 0001, Xiong Li. Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols
602 -- 609Alain Bertrand Bomgni, Garrik Brel Jagho Mdemaya. An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks
610 -- 620Xiaolin Chen, Zhixiong Chen, Huaning Liu. A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1}
621 -- 626Tianhong Yang. Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography
627 -- 637Changguang Wang, Zimeng Dai, Dongmei Zhao, Fangwei Wang. A Novel Identity-based Authentication Scheme for IoV Security
638 -- 644Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, Pabel Miah. A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms
645 -- 654Fuxiao Zhou, Yanping Li, Changlu Lin. A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security
655 -- 663Pengshou Xie, Guoqiang Ma, Tao Feng, Yan Yan, Xue-Ming Han. Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles
664 -- 671Yongshuang Wei, Jianhua Chen. Tripartite Authentication Protocol RFID/NFC Based on ECC
672 -- 680Cungang Yang, Celia Li. Secure Sharing of Data for Dynamic Group in Public Cloud
681 -- 685Zhengjun Cao, Xiqi Wang, Lihua Liu. A Note on One Popular Non-Interactive Zero-Knowledge Proof System
686 -- 697Linfan Wang, Yonghong Chen. A Perceptual Hash-based Approach to Detect Covert Timing Channels
698 -- 707Yinghui Zhang 0002, Xinwei Ma, Axin Wu, Fangyuan Ren, Dong Zheng 0001. An Efficient Mobile Location-based Service Framework for Resource-constrained Devices
708 -- 716Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang. Research on the Secure Financial Surveillance Blockchain Systems

Volume 22, Issue 3

371 -- 380Jingyu Wang, Jingnan Dong, Yuesheng Tan. Role Mining Algorithms Satisfied the Permission Cardinality Constraint
381 -- 391Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong. Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications
392 -- 396Jianhong Zhang, Wenle Bai, Zhengtao Jiang. On the Security of a Practical Constant-Size Ring Signature Scheme
397 -- 408Syed Mohd Faisal, Taskeen Zaidi. Timestamp Based Detection of Sybil Attack in VANET
409 -- 418Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong. Static Analysis of Superfluous Network Transmissions in Android Applications
419 -- 424Shoulin Yin, Jie Liu, Lin Teng. Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption
425 -- 434Xu Zhao, Guangqiu Huang, Reza Mousoli. A Multi-threading Solution to Multimedia Traffic in NIDS Based on Hybrid Genetic Algorithm
435 -- 441Faisal Nabi, Jianming Yong, Xiaohui Tao. A Novel Approach for Component based Application Logic Event Attack Modeling
442 -- 448Yang Liu, Mingxing He, Fangyuan Pu. Anonymous Transaction of Digital Currency Based on Blockchain
449 -- 459Zheng-Zhi Tang, Xuewen Zeng, Zhichuan Guo, Mangu Song. Malware Traffic Classification Based on Recurrence Quantification Analysis
460 -- 473Qianlong Dang, Hua Ma, Zhenhua Liu, Ying Xie. Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage
474 -- 483Cungang Yang, Celia Li. Design of Key Management Protocols for Internet of Things
484 -- 489Jing Bi, Shoulin Yin, Hang Li, Lin Teng, Chu Zhao. Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems
490 -- 501Tao Wan, Xiaochang Liu, Weichuan Liao, Nan Jiang. Cryptanalysis and Improvement of a Biometric-based Authentication Scheme for Multi-server Architecture
502 -- 513Ke Gu, Dianxing Liu, Bo Yin. Efficient Group Signature Scheme without Pairings
514 -- 520Tanweer Alam. Internet of Things: A Secure Cloud-based MANET Mobility Model
521 -- 531Hefeng Chen, Chin-Chen Chang 0001, Kaimeng Chen. Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem
532 -- 539Yuanyuan Xiao, Xiaoyao Xie. Application of Novel Gabor-DCNN into RGB-D Face Recognition
540 -- 547Munawar Hussain, Jiadong Ren, Awais Akram. Classification of DoS Attacks in Wireless Sensor Network with Artificial Neural Network

Volume 22, Issue 2

183 -- 190You-Jian Yu, Guang-Fu Wang, Jie Zhao. FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks
191 -- 200Keke Wu, Bo Peng, Hua Xie, Shaobin Zhan. A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks
201 -- 211Hui Xia, Weiji Yang. Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone
212 -- 217Wei-Liang Tai, Ya-Fen Chang, Wen-Hsin Huang. Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing
218 -- 230Rui-Hong Dong, Hou-Hua Yan, Qiu-yu Zhang. An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm
231 -- 241Emmanuel Mugabo, Qiu-yu Zhang. Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing
242 -- 249Yang Chen, Yonghong Chen. A Network Flow Correlation Method Based on Chaos Theory and Principal Component Analysis
250 -- 256Javad Saadatmandan, Amirhossein Rahimi. A Secure Authenticated Key Agreement Protocol for Application at Digital Certificat
257 -- 264Seth Alornyo, Yanan Zhao, Guobin Zhu, Hu Xiong. Identity Based Key-Insulated Encryption with Outsourced Equality Test
265 -- 274Huijun Yao, Chaopeng Li, Peng Sun. Using Parametric t-Distributed Stochastic Neighbor Embedding Combined with Hierarchical Neural Network for Network Intrusion Detection
275 -- 282Pengshou Xie, Xue-Ming Han, Tao Feng, Yan Yan, Guoqiang Ma. A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles
283 -- 295Diaa Salama Abdul Minaam, Mostafa Abdullah Ibrahim, Elsayed Badr. Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory
296 -- 305Yu Chen, Jiang-Yi Lin, Chin-Chen Chang, Yu-Chen Hu. Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell
306 -- 313Yueyang Su, Jing Wan, Junkai Yi. A PSO-based Wavelet-core ELM for Abnormal Flow Detection
314 -- 320Chu Zhao, Shoulin Yin, Hang Li, Yang Sun. Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group
321 -- 330Ming-Sang Chang, Chih Ping Yen. LinkedIn Social Media Forensics on Windows 10
331 -- 336Zhengjun Cao, Zhen Chen, Ruizhong Wei, Lihua Liu. Run-based Modular Reduction Method
337 -- 346Yuanquan Shi, Hong Shen. Anomaly Detection for Network Flow Using Immune Network and Density Peak
347 -- 357Pengshou Xie, Hong-Jin Fan, Tao Feng, Yan Yan, Guoqiang Ma, Xue-Ming Han. Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
358 -- 363Hsieh-Tsen Pan, Hung-Wei Yang, Min-Shiang Hwang. An Enhanced Secure Smart Card-based Password Authentication Scheme

Volume 22, Issue 1

1 -- 11Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, Xiangmin Guo. Packet Watermarking With ECG Biological Feature
12 -- 23Jia-Qi Wang, Yun-Feng Zhang, Dao-wei Liu. Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce
24 -- 35Hua Ma, Guohua Tian, Linchao Zhang. Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing
36 -- 40Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen. A Note On One Secure Data Self-Destructing Scheme In Cloud Computing
41 -- 53Shahrzad Sedaghat. The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks
54 -- 67Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, Yan Xiong. A Formal Framework of Shielding Systems by Stepwise Refinement
68 -- 79Hui Tian 0002, Zhao-Hua Zhu, Chin-Chen Chang 0001, Yongfeng Huang, Tian Wang 0001, Yonghong Chen, Yiqiao Cai. StegoNote: Steganography in Guitar Music Using Note Modulation
80 -- 92Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, Bo Meng. Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model
93 -- 101Budi Gunawan, Barito Mulyo Ratmono. Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace
102 -- 111Hui Guo, Lunzhi Deng. Certificateless Ring Signcryption Scheme from Pairings
112 -- 117Lin Teng, Hang Li, Shoulin Yin, Yang Sun. A Modified Advanced Encryption Standard for Data Security
118 -- 125Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon. Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
126 -- 135Xiaofeng Chen, Wenlong Guo. Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images
136 -- 144Ying-Chih Tseng, Heng Ma. A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information
145 -- 149Jing Chen, Feng Zhao 0002, Haiyan Xing. Research on Security of Mobile Communication Information Transmission Based on Heterogeneous Network
150 -- 154Shidong Zhang, Tongjiang Yan, Yuhua Sun, Lianhai Wang. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
155 -- 160Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, Yang Sun. An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain
161 -- 170Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu. Attribute Based Encryption with Efficient Revocation from Lattices
171 -- 176Zepeng Zhuo, Jinfeng Chong, Lei Yu. Correlation Functions of m-Sequences of Different Lengths
177 -- 182Xiaoyi Hong. Network Security Situation Prediction Based on Grey Relational Analysis and Support Vector Machine Algorithm