Search dblp for Publications

export results for "toc:db/journals/ijnsec/ijnsec20.bht:"

 download as .bib file

@article{DBLP:journals/ijnsec/Abdel-AzimSE18,
  author       = {Mohammed Abdel{-}Azim and
                  Hossam El{-}Din Salah and
                  Menas Ebrahim Eissa},
  title        = {{IDS} Against Black-Hole Attack for {MANET}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {585--592},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p585-592.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Abdel-AzimSE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AbdeljebbarK18,
  author       = {Mourad Abdeljebbar and
                  Rachid El Kouch},
  title        = {Security Improvements of {EPS-AKA} Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {636--644},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p636-644.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AbdeljebbarK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Al-AyedHL18,
  author       = {Fadi Al{-}Ayed and
                  Chunqiang Hu and
                  Hang Liu},
  title        = {An Efficient Practice of Privacy Implementation: Kerberos and Markov
                  Chain to Secure File Transfer Sessions},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {655--663},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p655-663.pdf},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Al-AyedHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Al-khatibH18,
  author       = {Abdullah Abdulrahman Al{-}khatib and
                  Rosilah Hassan},
  title        = {Impact of IPSec Protocol on the Performance of Network Real-Time Applications:
                  {A} Review},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {811--819},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p811-819.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Al-khatibH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AlamMRACM18,
  author       = {Kazi Md. Rokibul Alam and
                  Adnan Maruf and
                  Md. Rezaur Rahman Rakib and
                  G. G. Md. Nawaz Ali and
                  Peter Han Joo Chong and
                  Yasuhiko Morimoto},
  title        = {An Untraceable Voting Scheme Based on Pairs of Signatures},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {774--787},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p774-787.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AlamMRACM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AmritaR18,
  author       = {Amrita and
                  Kiran Kumar Ravulakollu},
  title        = {A Hybrid Intrusion Detection System: Integrating Hybrid Feature Selection
                  Approach with Heterogeneous Ensemble of Intelligent Classifiers},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {41--55},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p41-55.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AmritaR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AnnamalaiRR18,
  author       = {Prakash Annamalai and
                  Krishnaveni Raju and
                  Dhanalakshmi Ranganayakulu},
  title        = {Soft Biometrics Traits for Continuous Authentication in Online Exam
                  Using {ICA} Based Facial Recognition},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {423--432},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p423-432.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AnnamalaiRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AtkisonPSC18,
  author       = {Travis Atkison and
                  Stanislav Ponomarev and
                  Randy K. Smith and
                  Bernard Chen},
  title        = {Feature Extraction Optimization for Network Intrusion Detection in
                  Control System Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {853--861},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p853-861.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AtkisonPSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BehiGV18,
  author       = {Mostafa Behi and
                  Mohammad GhasemiGol and
                  Hamed Vahdat{-}Nejad},
  title        = {A New Approach to Quantify Network Security by Ranking of Security
                  Metrics and Considering Their Relationships},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {141--148},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p141-148.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BehiGV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BouchkarenL18,
  author       = {Said Bouchkaren and
                  Saiida Lazaar},
  title        = {{CAES} Cryptosystem: Advanced Security Tests and Results},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {177--183},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p177-183.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BouchkarenL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BoujnouniJ18,
  author       = {Mohamed el Boujnouni and
                  Mohamed Jedra},
  title        = {New Intrusion Detection System Based on Support Vector Domain Description
                  with Information Gain Metric},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {25--34},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p25-34.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BoujnouniJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoMLKW18,
  author       = {Zhengjun Cao and
                  Chong Mao and
                  Lihua Liu and
                  Wenping Kong and
                  Jinbo Wang},
  title        = {Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted
                  Cloud Data},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {683--688},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p683-688.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoMLKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChangHWL18,
  author       = {Chin{-}Chen Chang and
                  Ngoc{-}Tu Huynh and
                  Yu{-}Kai Wang and
                  Yanjun Liu},
  title        = {An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression
                  Codes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {478--488},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p478-488.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChangHWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChatterjeeP18,
  author       = {Kakali Chatterjee and
                  Lalita Priya},
  title        = {{HKDS:} {A} Hierarchical Key Distribution Scheme for Wireless Ad Hoc
                  Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {243--255},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p243-255.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChatterjeeP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChetiouiOH18,
  author       = {Kaouthar Chetioui and
                  Ghizlane Orhanou and
                  Said El Hajji},
  title        = {New Protocol {E-DNSSEC} to Enhance {DNSSEC} Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {19--24},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p19-24.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChetiouiOH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChiouKL18,
  author       = {Shin{-}Yan Chiou and
                  Wen{-}Tsai Ko and
                  Erl{-}Huei Lu},
  title        = {A Secure ECC-based Mobile {RFID} Mutual Authentication Protocol and
                  Its Application},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {396--402},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p396-402.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChiouKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CongC18,
  author       = {Cong Huang and
                  Chao Wang},
  title        = {Network Security Situation Awareness Based on the Optimized Dynamic
                  Wavelet Neural Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {593--600},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p593-600.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CongC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DasB18,
  author       = {Debasish Das and
                  Dhruba Kumar Bhattacharyya},
  title        = {Defeating Cyber Attacks Due to Script Injection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {225--234},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p225-234.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DasB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DeshpandeI18,
  author       = {Shilpa Deshpande and
                  Rajesh Ingle},
  title        = {Evidence Based Trust Estimation Model for Cloud Computing Services},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {291--303},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p291-303.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DeshpandeI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Desoky18,
  author       = {Abdelrahman Desoky},
  title        = {Uniform Resource Locator Based Steganography Methodology},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1005--1015},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1005-1015.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Desoky18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DongWZD18,
  author       = {Rui{-}Hong Dong and
                  Dong{-}Fang Wu and
                  Qiu{-}Yu Zhang and
                  Hong{-}xiang Duan},
  title        = {Mutual Information-based Intrusion Detection Model for Industrial
                  Internet},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {131--140},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p131-140.pdf},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DongWZD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DongWZZ18,
  author       = {Rui{-}Hong Dong and
                  Dong{-}Fang Wu and
                  Qiu{-}Yu Zhang and
                  Tao Zhang},
  title        = {Traffic Characteristic Map-based Intrusion Detection Model for Industrial
                  Internet},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {359--370},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p359-370.pdf},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DongWZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/EhmetDZZ18,
  author       = {Rena Ehmet and
                  Lunzhi Deng and
                  Yingying Zhang and
                  Jiwen Zeng},
  title        = {Multi-proxy Multi-signature without Pairing from Certificateless Cryptography},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {403--413},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p403-413.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/EhmetDZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ElkhadirCB18,
  author       = {Zyad Elkhadir and
                  Khalid Chougdali and
                  Mohammed Benattou},
  title        = {Improving Network Intrusion Detection Using Geometric Mean {LDA}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {820--826},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p820-826.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ElkhadirCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Elngar18,
  author       = {Ahmed A. Elngar},
  title        = {IoT-based Efficient Tamper Detection Mechanism for Healthcare Application},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {489--495},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p489-495.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Elngar18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ElsadigF18,
  author       = {Muawia A. Elsadig and
                  Yahia A. Fadlalla},
  title        = {An Efficient Approach to Resolve Covert Channels},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {898--906},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p898-906.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ElsadigF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FangL18,
  author       = {Jie Fang and
                  Chenglian Liu},
  title        = {A Generalize Estimating the {\O}(n) of Upper-Lower Bound to {RSA}
                  Public Key Crytosystem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {332--336},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p332-336.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FangLW18,
  author       = {Ledi Fang and
                  Shundong Li and
                  Wenli Wang},
  title        = {An Efficient Protocol for Privately Determining the Relationship Between
                  Two Straight Lines},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1175--1182},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1175-1182.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FangLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FengG18,
  author       = {Tao Feng and
                  Jiaqi Guo},
  title        = {A New Access Control System Based on {CP-ABE} in Named Data Networking},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {710--720},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p710-720.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FengG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GangardeCO18,
  author       = {Mahesh Gangarde and
                  Janardhan Chitode and
                  Shruti Oza},
  title        = {Application of Video Watermarking Using Subdivision Technique to Enhance
                  Information Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1042--1052},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1042-1052.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GangardeCO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GaoDLRL18,
  author       = {Xinwei Gao and
                  Jintai Ding and
                  Lin Li and
                  Saraswathy RV and
                  Jiqiang Liu},
  title        = {Efficient Implementation of Password-based Authenticated Key Exchange
                  from {RLWE} and Post-Quantum {TLS}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {923--930},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p923-930.pdf},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GaoDLRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GhantiN18,
  author       = {Shaila Ghanti and
                  G. M. Naik},
  title        = {Defense Techniques of {SYN} Flood Attack Characterization and Comparisons},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {721--729},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p721-729.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GhantiN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GhoshLY18,
  author       = {Debsmita Ghosh and
                  Celia Li and
                  Cungang Yang},
  title        = {A Lightweight Authentication Protocol in Smart Grid},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {414--422},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p414-422.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GhoshLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GuWWL18,
  author       = {Ke Gu and
                  LinYu Wang and
                  Na Wu and
                  NianDong Liao},
  title        = {Traceable Certificateless Ring Signature Scheme For No Full Anonymous
                  Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {762--773},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p762-773.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GuWWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GuoCC18,
  author       = {Cheng Guo and
                  Chin{-}Chen Chang and
                  Shih{-}Chang Chang},
  title        = {A Secure and Efficient Mutual Authentication and Key Agreement Protocol
                  with Smart Cards for Wireless Communications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {323--331},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p323-331.pdf},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GuoCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GuoS18,
  author       = {Rui Guo and
                  Huixian Shi},
  title        = {An Efficient Confidentiality Preserving Scheme Using Certificateless
                  Encryption with High Trust Level},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {78--87},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p78-87.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GuoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HamidBJS18,
  author       = {Yasir Hamid and
                  Veeran Ranganathan Balasaraswathi and
                  Ludovic Journaux and
                  Muthukumarasamy Sugumaran},
  title        = {Benchmark Datasets for Network Intrusion Detection: {A} Review},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {645--654},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p645-654.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HamidBJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HarmouchEB18,
  author       = {Youssef Harmouch and
                  Rachid Elkouch and
                  Hussain Ben{-}Azza},
  title        = {Multiple New Formulas for Cipher Performance Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {788--800},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p788-800.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HarmouchEB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HarshaCV18,
  author       = {Harsha Putla and
                  Chanakya Patibandla and
                  China Venkaiah Vadlamudi},
  title        = {A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing
                  Sequence},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {527--535},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p527-535.pdf},
  timestamp    = {Tue, 14 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HarshaCV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HazraGJ18,
  author       = {Animesh Hazra and
                  Soumya Ghosh and
                  Sampad Jash},
  title        = {A Review on {DNA} Based Cryptographic Techniques},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1093--1104},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1093-1104.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HazraGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HouYH18,
  author       = {Huiying Hou and
                  Jia Yu and
                  Rong Hao},
  title        = {Provable Multiple-Replica Dynamic Data Possession for Big Data Storage
                  in Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {575--584},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p575-584.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HouYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangCH18,
  author       = {Li{-}Chin Huang and
                  Ting{-}Yi Chang and
                  Min{-}Shiang Hwang},
  title        = {A Conference Key Scheme Based on the Diffie-Hellman Key Exchange},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1221--1226},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1221-1226.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuangCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangCLF18,
  author       = {Jian{-}Hua Huang and
                  Liang{-}Jie Chen and
                  Fan{-}Chao Li and
                  Ze Fang},
  title        = {Security Quantification Method for Intrusion Tolerance Systems Based
                  on Multi-recovery},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1033--1041},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1033-1041.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuangCLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangZH18,
  author       = {Yi{-}Bo Huang and
                  Qiu{-}Yu Zhang and
                  Wen{-}Jin Hu},
  title        = {Robust Speech Perception Hashing Authentication Algorithm Based on
                  Spectral Subtraction and Multi-feature Tensor},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {206--216},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p206-216.pdf},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuangZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JacksonSK18,
  author       = {Samuel Jackson and
                  Jeremy Straub and
                  Scott Kerlin},
  title        = {Exploring a Novel Cryptographic Solution for Securing Small Satellite
                  Communications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {988--997},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p988-997.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JacksonSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JananiM18,
  author       = {V. S. Janani and
                  M. S. K. Manikandan},
  title        = {An Outlook on Cryptographic and Trust Methodologies for Clusters Based
                  Security in Mobile Ad Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {746--753},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p746-753.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JananiM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JiangLT18,
  author       = {Shaoquan Jiang and
                  Min Li and
                  Zailiang Tang},
  title        = {A New Scheme for Source-location Privacy in Wireless Sensor Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {879--889},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p879-889.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JiangLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JiangWG18,
  author       = {Chunlin Jiang and
                  Shi{-}lan Wu and
                  Ke Gu},
  title        = {New Kind of Delegation-based Anonymous Authentication Scheme for Wireless
                  Roaming Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {235--242},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p235-242.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JiangWG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JimG18,
  author       = {Lincy Elizebeth Jim and
                  Mark A. Gregory},
  title        = {A Grudger Based {AIS} Approach to Coerce Selfish Node Cooperation
                  in {MANET}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {914--922},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p914-922.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JimG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JoLLS18,
  author       = {KwangHyok Jo and
                  Weimin Lei and
                  Zhaozheng Li and
                  Xiaoshi Song},
  title        = {A Reversible Watermarking Algorithm in the Lossless Mode of {HEVC}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {844--852},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p844-852.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JoLLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KadirL18,
  author       = {Govand Salih Kadir and
                  Ihsan Alshahib Lami},
  title        = {Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using
                  Localization Information},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1022--1032},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1022-1032.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KadirL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KavithaM18,
  author       = {P. Kavitha and
                  Rajeswari Mukesh},
  title        = {Detection of Impersonation Attack in {MANET} Using Polynomial Reduction
                  Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {381--389},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p381-389.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KavithaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KhashanK18,
  author       = {Osama Ahmed Khashan and
                  Nour Mahmoud Khafajah},
  title        = {Secure Stored Images Using Transparent Crypto Filter Driver},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1053--1060},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1053-1060.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KhashanK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KibiwottZOA18,
  author       = {Kittur P. Kibiwott and
                  Fengli Zhang and
                  Anyembe Andrew Omala and
                  Daniel Adu{-}Gyamfi},
  title        = {Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access
                  Control and Outsourcing Decryption from {ABE}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1149--1162},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1149-1162.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KibiwottZOA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KurniawanR18,
  author       = {Ade Kurniawan and
                  Imam Riadi},
  title        = {Detection and Analysis Cerber Ransomware Using Network Forensics Behavior
                  Based},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {836--843},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p836-843.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KurniawanR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LPS18,
  author       = {Prakash G. L and
                  Manish Prateek and
                  Inder Singh},
  title        = {Data Verification Using Block Level Batch Auditing on Multi-cloud
                  Server},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {702--709},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p702-709.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiCY18,
  author       = {Celia Li and
                  Helen Cheung and
                  Cungang Yang},
  title        = {Secure and Efficient Authentication Protocol for Power System Computer
                  Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {337--344},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p337-344.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiLL18,
  author       = {Chunhu Li and
                  Guangchun Luo and
                  Chunbao Li},
  title        = {A Novel Scheme for the Preview of the Image Encryption Based on Chaotic
                  Ikeda Map},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1105--1114},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1105-1114.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiMZ18,
  author       = {Sujuan Li and
                  Yi Mu and
                  Mingwu Zhang},
  title        = {Certificate-based Smooth Projective Hashing and Its Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {266--277},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p266-277.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiSL18,
  author       = {Yunfa Li and
                  Yangyang Shen and
                  Mingyi Li},
  title        = {A Credible Mechanism of Service about Data Resource in Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {754--761},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p754-761.pdf},
  timestamp    = {Wed, 27 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiWLC18,
  author       = {Jianjun Li and
                  Yun{-}He Wu and
                  Chin{-}Feng Lee and
                  Chin{-}Chen Chang},
  title        = {Generalized {PVO-K} Embedding Technique for Reversible Data Hiding},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {65--77},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p65-77.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiWLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiZX18,
  author       = {Xiaodong Li and
                  Cailan Zhou and
                  Ning Xu},
  title        = {A Secure and Efficient Image Encryption Algorithm Based on {DNA} Coding
                  and Spatiotemporal Chaos},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {110--120},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p110-120.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Lin18,
  author       = {Tzu{-}Chun Lin},
  title        = {A Study of Non-Abelian Public Key},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {278--290},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p278-290.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Lin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Lin18a,
  author       = {Li Lin},
  title        = {A Detection and Defense Technology for Information-stealing and Deceitful
                  Trojan Viruses Based on Behavioral Features},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {983--987},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p983-987.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Lin18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuS18,
  author       = {Shuang{-}Gen Liu and
                  Xue{-}Jing Sun},
  title        = {A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf
                  Representation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {931--937},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p931-937.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LuXNQ18,
  author       = {Gang Lu and
                  Linyuan Xue and
                  Xuyun Nie and
                  Zhiguang Qin},
  title        = {Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem
                  with Invertible Cycle},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {509--514},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p509-514.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuXNQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LuXNQL18,
  author       = {Gang Lu and
                  Linyuan Xuan and
                  Xuyun Nie and
                  Zhiguang Qin and
                  Bo Liu},
  title        = {Cubic Medium Field Equation Public Key Cryptosystem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {472--477},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p472-477.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuXNQL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LvLZM18,
  author       = {Yanhui Lv and
                  Kexin Liu and
                  Deyu Zhang and
                  Zhuo Miao},
  title        = {A Secure Routing Protocol Based on Reputation Mechanism},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {862--871},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p862-871.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LvLZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MaHPZ18,
  author       = {Hua Ma and
                  Xiaoyu Han and
                  Ting Peng and
                  Linchao Zhang},
  title        = {Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data
                  Public Auditing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1074--1084},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1074-1084.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MaHPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MahtoY18,
  author       = {Dindayal Mahto and
                  Dilip Kumar Yadav},
  title        = {Performance Analysis of {RSA} and Elliptic Curve Cryptography},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {625--635},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p625-635.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MahtoY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MaityBK18,
  author       = {Gitika Maity and
                  Jaydeb Bhaumik and
                  Anjan Kundu},
  title        = {A New {SPN} Type Architecture to Strengthen Block Cipher Against Fault
                  Attack},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {455--462},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p455-462.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MaityBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MalikP18,
  author       = {Arun Malik and
                  Babita Pandey},
  title        = {Security Analysis of Discrete Event Based Threat Driven Authentication
                  Approach in {VANET} Using Petri Nets},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {601--608},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p601-608.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MalikP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MeshramML18,
  author       = {Chandrashekhar Meshram and
                  Sarita Gajbhiye Meshram and
                  Cheng{-}Chi Lee},
  title        = {Constructing Provably Secure ID-based Beta Cryptographic Scheme in
                  Random Oracle},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {568--574},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p568-574.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MeshramML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MohamedAAZP18,
  author       = {Kamsiah Mohamed and
                  Fakariah Hani Hj Mohd Ali and
                  Suriyani Ariffin and
                  Nur Hafiza Zakaria and
                  Mohd Nazran Mohammed Pauzi},
  title        = {An Improved {AES} S-box Based on Fibonacci Numbers and Prime Factor},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1206--1214},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1206-1214.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MohamedAAZP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MohamedWZ18,
  author       = {Mojahed Mohamed and
                  Xiaofen Wang and
                  Xiaosong Zhang},
  title        = {Adaptively-Secure Authenticated Key Exchange Protocol in Standard
                  Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {345--358},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p345-358.pdf},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MohamedWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MohanCR18,
  author       = {Naresh Babu Muthu Mohan and
                  Ardhani Sathya Narayana Chakravarthy and
                  Cherukuri Ravindranath},
  title        = {Cryptanalysis of Design and Analysis of a Provably Secure Multi-server
                  Authentication Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {217--224},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p217-224.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MohanCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MuruganS18,
  author       = {K. Murugan and
                  P. Suresh},
  title        = {Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques
                  in Wireless Ad Hoc Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {730--737},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p730-737.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MuruganS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MuthalaguJ18,
  author       = {Raja Muthalagu and
                  Subeen Jain},
  title        = {Application of {FSM} Machine and S-Box in {KASUMI} Block Cipher to
                  Improve Its Resistance Against Attack},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {890--897},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p890-897.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MuthalaguJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Nezarat18,
  author       = {Amin Nezarat},
  title        = {Distributed Intrusion Detection System Based on Mixed Cooperative
                  and Non-Cooperative Game Theoretical Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {56--64},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p56-64.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Nezarat18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/OkosunOB18,
  author       = {Kazeem O. Okosun and
                  Samson Ogunlade and
                  Ebenezer Bonyah},
  title        = {Optimal Control Analysis of Computer Virus Transmission},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {971--982},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p971-982.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/OkosunOB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PadmavathiVK18,
  author       = {V. Padmavathi and
                  B. Vishnu Vardhan and
                  Addepalli V. N. Krishna},
  title        = {Provably Secure Quantum Key Distribution By Applying Quantum Gate},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {88--94},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p88-94.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PadmavathiVK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PreethaC18,
  author       = {V. Preetha and
                  K. Chitra},
  title        = {{ZBMRP:} Zone Based {MANET} Routing Protocol with Genetic Algorithm
                  and Security Enhancement Using Neural Network Learning},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1115--1124},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1115-1124.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PreethaC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PurwantoKHR18,
  author       = {Yudha Purwanto and
                  Kuspriyanto and
                  Hendrawan and
                  Budi Rahardjo},
  title        = {Cost Analysis for Classification-based Autonomous Response Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {121--130},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p121-130.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PurwantoKHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PutraMSKA18,
  author       = {Septafiansyah Dwi Putra and
                  Ma'muri and
                  Sarwono Sutikno and
                  Yusuf Kurniawan and
                  Adang Suwandi Ahmad},
  title        = {Design of an {AES} Device as Device Under Test in a {DPA} Attack},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {256--265},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p256-265.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PutraMSKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RaisM18,
  author       = {Helmi Md Rais and
                  Tahir Mehmood},
  title        = {Dynamic Ant Colony System with Three Level Update Feature Selection
                  for Intrusion Detection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {184--192},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p184-192.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RaisM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RajaramaSS18,
  author       = {Chitra Rajarama and
                  Jagadeesha Narasimhamurthy Sugatoor and
                  T. Yerri Swamy},
  title        = {Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption
                  and Proxy Re-encryption Using Circulant Matrices},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {617--624},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p617-624.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RajaramaSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RasslanEA18,
  author       = {Mohamed Rasslan and
                  Ghada F. El{-}Kabbany and
                  Heba Kamal Aslan},
  title        = {New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels
                  of Parallelism},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {371--380},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p371-380.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RasslanEA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RawatPJ18,
  author       = {Ramesh Singh Rawat and
                  Emmanuel S. Pilli and
                  Ramesh Chandra Joshi},
  title        = {Survey of Peer-to-Peer Botnets and Detection Frameworks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {547--557},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p547-557.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RawatPJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SangeethaK18,
  author       = {V. Sangeetha and
                  S. Swapna Kumar},
  title        = {Probabilistic Framework for Assessing the Threat Level using Novel
                  Decision Constructs in Mobile Adhoc Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1085--1092},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1085-1092.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SangeethaK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SethiaSG18,
  author       = {Divyashikha Sethia and
                  Huzur Saran and
                  Daya Gupta},
  title        = {{CP-ABE} for Selective Access with Scalable Revocation: {A} Case Study
                  for Mobile-based Healthfolder},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {689--701},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p689-701.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SethiaSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SinghJ18,
  author       = {Umesh Kumar Singh and
                  Chanchala Joshi},
  title        = {Scalable Approach Towards Discovery of Unknown Vulnerabilities},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {827--835},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p827-835.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SinghJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SivabalanR18,
  author       = {Sujatha Sivabalan and
                  Peter J. Radcliffe},
  title        = {Power Efficient Secure Web Servers},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {304--312},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p304-312.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SivabalanR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SivabalanR18a,
  author       = {Sujatha Sivabalan and
                  Peter J. Radcliffe},
  title        = {Feasibility of Eliminating {IDPS} Devices from a Web Server Farm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {433--438},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p433-438.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SivabalanR18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SrinathC18,
  author       = {M. Seshadri Srinath and
                  Venkatachalam Chandrasekaran},
  title        = {Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {9--18},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p9-18.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SrinathC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SrinivasKR18,
  author       = {Vegi Srinivas and
                  Vatsavayi Valli Kumari and
                  K. V. S. V. N. Raju},
  title        = {Perseverance of Uncertainty in Cloud Storage Services through Reputation
                  Based Trust},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {951--959},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p951-959.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SrinivasKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Styugin18,
  author       = {Mikhail Styugin},
  title        = {Establishing Systems Secure from Research with Implementation in Encryption
                  Algorithms},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {35--40},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p35-40.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Styugin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SukumaranM18,
  author       = {Sreeja Cherillath Sukumaran and
                  Mohammed Misbahuddin},
  title        = {{DNA} Cryptography for Secure Data Storage in Cloud},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {447--454},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p447-454.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SukumaranM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TangWY18,
  author       = {Dan Tang and
                  Yaqiang Wang and
                  Haopeng Yang},
  title        = {Array Erasure Codes with Preset Fault Tolerance Capability},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {193--200},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p193-200.pdf},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TangWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TarekOA18,
  author       = {Eman Tarek and
                  Osama Ouda and
                  Ahmed Atwan},
  title        = {Image-based Multimodal Biometric Authentication Using Double Random
                  Phase Encoding},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1163--1174},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1163-1174.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TarekOA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TengL18,
  author       = {Lin Teng and
                  Hang Li},
  title        = {A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature
                  Scheme via Elliptic Curve and Bilinear Mapping},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1200--1205},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1200-1205.pdf},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TengL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TengLLY18,
  author       = {Lin Teng and
                  Hang Li and
                  Jie Liu and
                  Shoulin Yin},
  title        = {An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed
                  Homomorphic Encryption and Multi-Attribute Sorting Method},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {872--878},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p872-878.pdf},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TengLLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TianST18,
  author       = {Xiuxia Tian and
                  Qian Song and
                  Fuliang Tian},
  title        = {Multidimensional Data Aggregation Scheme For Smart Grid with Differential
                  Privacy},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1137--1148},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1137-1148.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TianST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiHH18,
  author       = {Cheng{-}Yi Tsai and
                  Pi{-}Fang Ho and
                  Min{-}Shiang Hwang},
  title        = {A Secure Group Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {201--205},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p201-205.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TsaiHH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiYLH18,
  author       = {Cheng{-}Yi Tsai and
                  Cheng{-}Ying Yang and
                  Iuon{-}Chang Lin and
                  Min{-}Shiang Hwang},
  title        = {A Survey of E-book Digital Right Management},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {998--1004},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p998-1004.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TsaiYLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/UpadhyayK18,
  author       = {Ranjit Kumar Upadhyay and
                  Sangeeta Kumari},
  title        = {Global Stability of Worm Propagation Model with Nonlinear Incidence
                  Rate in Computer Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {515--526},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p515-526.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/UpadhyayK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/VaanchigXCQ18,
  author       = {Nyamsuren Vaanchig and
                  Hu Xiong and
                  Wei Chen and
                  Zhiguang Qin},
  title        = {Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority
                  {CP-ABE} Scheme with Dual-Revocation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {95--109},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p95-109.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/VaanchigXCQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/VeenaM18,
  author       = {K. Veena and
                  K. Meena},
  title        = {Identification of Cyber Criminal by Analysing the Users Profile},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {738--745},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p738-745.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/VeenaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangLW18,
  author       = {Yanhua Wang and
                  Yaqiu Liu and
                  Kun Wang},
  title        = {A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute
                  and Support Strategy Dynamic Update Via Hybrid Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {907--913},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p907-913.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangS18,
  author       = {Xiaogang Wang and
                  Weiren Shi},
  title        = {Secure Time Synchronization Protocol for Wireless Sensor Network Based
                  on {\(\mathrm{\mu}\)}TESLA Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {536--546},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p536-546.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH18,
  author       = {Yu{-}Lun Wang and
                  Jau{-}Ji Shen and
                  Min{-}Shiang Hwang},
  title        = {A Survey of Reversible Data Hiding for VQ-Compressed Images},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {1--8},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p1-8.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH18a,
  author       = {Yu{-}Lun Wang and
                  Jau{-}Ji Shen and
                  Min{-}Shiang Hwang},
  title        = {A Novel Dual Image-based High Payload Reversible Hiding Technique
                  Using {LSB} Matching},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {801--804},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p801-804.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangSH18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangZLWB18,
  author       = {Qiuhua Wang and
                  Hongxia Zhang and
                  Qiuyun Lyu and
                  Xiaojun Wang and
                  Jianrong Bao},
  title        = {A Novel Physical Channel Characteristics-based Channel Hopping Scheme
                  for Jamming-resistant in Wireless Communication},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {439--446},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p439-446.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangZLWB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WeiY18,
  author       = {Zhe Wei and
                  Shuyan Yu},
  title        = {Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor
                  Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {496--501},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p496-501.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WeiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Wu18,
  author       = {Xu Wu},
  title        = {Study on Trust Model for Multi-users in Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {674--682},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p674-682.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Wu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XieJL18,
  author       = {Rui Xie and
                  Bi{-}yuan Jian and
                  Daowei Liu},
  title        = {An Improved Ownership Transfer for {RFID} Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {149--156},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p149-156.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XieJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XieLL18,
  author       = {Rui Xie and
                  Jie Ling and
                  Daowei Liu},
  title        = {A Wireless Key Generation Algorithm for {RFID} System Based on Bit
                  Operation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {938--950},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p938-950.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XieLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XieQXLP18,
  author       = {Bei Xie and
                  Jiaohua Qin and
                  Xuyu Xiang and
                  Hao Li and
                  Lili Pan},
  title        = {An Image Retrieval Algorithm Based on Gist and Sift Features},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {609--616},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p609-616.pdf},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XieQXLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XuGH18,
  author       = {Xiaolong Xu and
                  Zhonghe Gao and
                  Lijuan Han},
  title        = {An Efficient Compromised Nodes Detection System in Wireless Sensor
                  Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {5},
  pages        = {960--970},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p960-970.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XuGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YangCZ18,
  author       = {Wenjie Yang and
                  Min{-}Rong Chen and
                  Guo{-}Qiang Zeng},
  title        = {Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures
                  in the Standard Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1194--1199},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1194-1199.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YangCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YangJGXW18,
  author       = {Ming Yang and
                  Rong Jiang and
                  Tilei Gao and
                  Wanyu Xie and
                  Jia Wang},
  title        = {Research on Cloud Computing Security Risk Assessment Based on Information
                  Entropy and Markov Chain},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {664--673},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p664-673.pdf},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YangJGXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YaoLWLM18,
  author       = {Lili Yao and
                  Jiabing Liu and
                  Dejun Wang and
                  Jing Li and
                  Bo Meng},
  title        = {Formal Analysis of {SDN} Authentication Protocol with Mechanized Protocol
                  Verifier in the Symbolic Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1125--1136},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1125-1136.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YaoLWLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Zhang18,
  author       = {Jialiang Zhang},
  title        = {Application of Artificial Intelligence Technology in Computer Network
                  Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1016--1021},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1016-1021.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Zhang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Zhang18a,
  author       = {Yun Zhang},
  title        = {Research on the Security Protection of E-Commerce Information under
                  the Background of Mobile Consumption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1215--1220},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1215-1220.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Zhang18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Zhang18b,
  author       = {Lei Zhang},
  title        = {Supervision and Investigation of Internet Fraud Crimes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1227--1233},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1227-1233.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Zhang18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangWW18,
  author       = {Xueqin Zhang and
                  Baoping Wang and
                  Wei Wang},
  title        = {A New Remote Authentication Scheme for Anonymous Users Using Elliptic
                  Curves Cryptosystem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {390--395},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p390-395.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangY18,
  author       = {Leyou Zhang and
                  Hongjian Yin},
  title        = {Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {168--176},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p168-176.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoQ18,
  author       = {Yongliang Zhao and
                  Quan Qian},
  title        = {Android Malware Identification Through Visual Exploration of Disambly
                  Files},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1061--1073},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1061-1073.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoSYZC18,
  author       = {Hongzhuan Zhao and
                  Dihua Sun and
                  Hang Yue and
                  Min Zhao and
                  Senlin Cheng},
  title        = {Dynamic Trust Model for Vehicular Cyber-Physical Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {157--167},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p157-167.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoSYZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhouZW18,
  author       = {Caixue Zhou and
                  Yue Zhang and
                  Lingmin Wang},
  title        = {A Provable Secure Identity-based Generalized Proxy Signcryption Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {1183--1193},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1183-1193.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhouZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhuL18,
  author       = {Hongfeng Zhu and
                  Junlin Liu},
  title        = {Provably Secure and Repeatable Authenticated Privacy-Protection Scheme
                  Using Chaotic Maps with Distributed Architecture},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {463--471},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p463-471.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhuL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhuW18,
  author       = {Hongfeng Zhu and
                  Rui Wang},
  title        = {A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {313--322},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p313-322.pdf},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhuW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZimbaCW18,
  author       = {Aaron Zimba and
                  Hongsong Chen and
                  Zhaoshun Wang},
  title        = {Bayesian-Boolean Logic Security Assessment Model for Malware-Free
                  Intrusions},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {558--567},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p558-567.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZimbaCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZouWY18,
  author       = {Lina Zou and
                  Xueying Wang and
                  Shoulin Yin},
  title        = {A Data Sorting and Searching Scheme Based on Distributed Asymmetric
                  Searchable Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {502--508},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p502-508.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZouWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Zuo18,
  author       = {Cen Zuo},
  title        = {Defense of Computer Network Viruses Based on Data Mining Technology},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {805--810},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p805-810.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Zuo18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics