Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnsec/ijnsec20.bht:"
@article{DBLP:journals/ijnsec/Abdel-AzimSE18, author = {Mohammed Abdel{-}Azim and Hossam El{-}Din Salah and Menas Ebrahim Eissa}, title = {{IDS} Against Black-Hole Attack for {MANET}}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {585--592}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p585-592.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Abdel-AzimSE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AbdeljebbarK18, author = {Mourad Abdeljebbar and Rachid El Kouch}, title = {Security Improvements of {EPS-AKA} Protocol}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {636--644}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p636-644.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AbdeljebbarK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Al-AyedHL18, author = {Fadi Al{-}Ayed and Chunqiang Hu and Hang Liu}, title = {An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {655--663}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p655-663.pdf}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/Al-AyedHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Al-khatibH18, author = {Abdullah Abdulrahman Al{-}khatib and Rosilah Hassan}, title = {Impact of IPSec Protocol on the Performance of Network Real-Time Applications: {A} Review}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {811--819}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p811-819.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Al-khatibH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AlamMRACM18, author = {Kazi Md. Rokibul Alam and Adnan Maruf and Md. Rezaur Rahman Rakib and G. G. Md. Nawaz Ali and Peter Han Joo Chong and Yasuhiko Morimoto}, title = {An Untraceable Voting Scheme Based on Pairs of Signatures}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {774--787}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p774-787.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AlamMRACM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AmritaR18, author = {Amrita and Kiran Kumar Ravulakollu}, title = {A Hybrid Intrusion Detection System: Integrating Hybrid Feature Selection Approach with Heterogeneous Ensemble of Intelligent Classifiers}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {41--55}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p41-55.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AmritaR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AnnamalaiRR18, author = {Prakash Annamalai and Krishnaveni Raju and Dhanalakshmi Ranganayakulu}, title = {Soft Biometrics Traits for Continuous Authentication in Online Exam Using {ICA} Based Facial Recognition}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {423--432}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p423-432.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AnnamalaiRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AtkisonPSC18, author = {Travis Atkison and Stanislav Ponomarev and Randy K. Smith and Bernard Chen}, title = {Feature Extraction Optimization for Network Intrusion Detection in Control System Networks}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {853--861}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p853-861.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AtkisonPSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BehiGV18, author = {Mostafa Behi and Mohammad GhasemiGol and Hamed Vahdat{-}Nejad}, title = {A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {141--148}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p141-148.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BehiGV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BouchkarenL18, author = {Said Bouchkaren and Saiida Lazaar}, title = {{CAES} Cryptosystem: Advanced Security Tests and Results}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {177--183}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p177-183.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BouchkarenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BoujnouniJ18, author = {Mohamed el Boujnouni and Mohamed Jedra}, title = {New Intrusion Detection System Based on Support Vector Domain Description with Information Gain Metric}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {25--34}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p25-34.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BoujnouniJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoMLKW18, author = {Zhengjun Cao and Chong Mao and Lihua Liu and Wenping Kong and Jinbo Wang}, title = {Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {683--688}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p683-688.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoMLKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChangHWL18, author = {Chin{-}Chen Chang and Ngoc{-}Tu Huynh and Yu{-}Kai Wang and Yanjun Liu}, title = {An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {478--488}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p478-488.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChangHWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChatterjeeP18, author = {Kakali Chatterjee and Lalita Priya}, title = {{HKDS:} {A} Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {243--255}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p243-255.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChatterjeeP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChetiouiOH18, author = {Kaouthar Chetioui and Ghizlane Orhanou and Said El Hajji}, title = {New Protocol {E-DNSSEC} to Enhance {DNSSEC} Security}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {19--24}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p19-24.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChetiouiOH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChiouKL18, author = {Shin{-}Yan Chiou and Wen{-}Tsai Ko and Erl{-}Huei Lu}, title = {A Secure ECC-based Mobile {RFID} Mutual Authentication Protocol and Its Application}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {396--402}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p396-402.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChiouKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CongC18, author = {Cong Huang and Chao Wang}, title = {Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {593--600}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p593-600.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CongC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DasB18, author = {Debasish Das and Dhruba Kumar Bhattacharyya}, title = {Defeating Cyber Attacks Due to Script Injection}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {225--234}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p225-234.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DasB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DeshpandeI18, author = {Shilpa Deshpande and Rajesh Ingle}, title = {Evidence Based Trust Estimation Model for Cloud Computing Services}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {291--303}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p291-303.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DeshpandeI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Desoky18, author = {Abdelrahman Desoky}, title = {Uniform Resource Locator Based Steganography Methodology}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1005--1015}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1005-1015.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Desoky18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DongWZD18, author = {Rui{-}Hong Dong and Dong{-}Fang Wu and Qiu{-}Yu Zhang and Hong{-}xiang Duan}, title = {Mutual Information-based Intrusion Detection Model for Industrial Internet}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {131--140}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p131-140.pdf}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/DongWZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DongWZZ18, author = {Rui{-}Hong Dong and Dong{-}Fang Wu and Qiu{-}Yu Zhang and Tao Zhang}, title = {Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {359--370}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p359-370.pdf}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/DongWZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/EhmetDZZ18, author = {Rena Ehmet and Lunzhi Deng and Yingying Zhang and Jiwen Zeng}, title = {Multi-proxy Multi-signature without Pairing from Certificateless Cryptography}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {403--413}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p403-413.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/EhmetDZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ElkhadirCB18, author = {Zyad Elkhadir and Khalid Chougdali and Mohammed Benattou}, title = {Improving Network Intrusion Detection Using Geometric Mean {LDA}}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {820--826}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p820-826.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ElkhadirCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Elngar18, author = {Ahmed A. Elngar}, title = {IoT-based Efficient Tamper Detection Mechanism for Healthcare Application}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {489--495}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p489-495.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Elngar18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ElsadigF18, author = {Muawia A. Elsadig and Yahia A. Fadlalla}, title = {An Efficient Approach to Resolve Covert Channels}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {898--906}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p898-906.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ElsadigF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FangL18, author = {Jie Fang and Chenglian Liu}, title = {A Generalize Estimating the {\O}(n) of Upper-Lower Bound to {RSA} Public Key Crytosystem}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {332--336}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p332-336.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FangLW18, author = {Ledi Fang and Shundong Li and Wenli Wang}, title = {An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1175--1182}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1175-1182.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FangLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FengG18, author = {Tao Feng and Jiaqi Guo}, title = {A New Access Control System Based on {CP-ABE} in Named Data Networking}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {710--720}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p710-720.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FengG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GangardeCO18, author = {Mahesh Gangarde and Janardhan Chitode and Shruti Oza}, title = {Application of Video Watermarking Using Subdivision Technique to Enhance Information Security}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1042--1052}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1042-1052.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GangardeCO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GaoDLRL18, author = {Xinwei Gao and Jintai Ding and Lin Li and Saraswathy RV and Jiqiang Liu}, title = {Efficient Implementation of Password-based Authenticated Key Exchange from {RLWE} and Post-Quantum {TLS}}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {923--930}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p923-930.pdf}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/GaoDLRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GhantiN18, author = {Shaila Ghanti and G. M. Naik}, title = {Defense Techniques of {SYN} Flood Attack Characterization and Comparisons}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {721--729}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p721-729.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GhantiN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GhoshLY18, author = {Debsmita Ghosh and Celia Li and Cungang Yang}, title = {A Lightweight Authentication Protocol in Smart Grid}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {414--422}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p414-422.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GhoshLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GuWWL18, author = {Ke Gu and LinYu Wang and Na Wu and NianDong Liao}, title = {Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {762--773}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p762-773.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GuWWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GuoCC18, author = {Cheng Guo and Chin{-}Chen Chang and Shih{-}Chang Chang}, title = {A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {323--331}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p323-331.pdf}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/GuoCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GuoS18, author = {Rui Guo and Huixian Shi}, title = {An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {78--87}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p78-87.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GuoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HamidBJS18, author = {Yasir Hamid and Veeran Ranganathan Balasaraswathi and Ludovic Journaux and Muthukumarasamy Sugumaran}, title = {Benchmark Datasets for Network Intrusion Detection: {A} Review}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {645--654}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p645-654.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HamidBJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HarmouchEB18, author = {Youssef Harmouch and Rachid Elkouch and Hussain Ben{-}Azza}, title = {Multiple New Formulas for Cipher Performance Computing}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {788--800}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p788-800.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HarmouchEB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HarshaCV18, author = {Harsha Putla and Chanakya Patibandla and China Venkaiah Vadlamudi}, title = {A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {527--535}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p527-535.pdf}, timestamp = {Tue, 14 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/HarshaCV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HazraGJ18, author = {Animesh Hazra and Soumya Ghosh and Sampad Jash}, title = {A Review on {DNA} Based Cryptographic Techniques}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1093--1104}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1093-1104.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HazraGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HouYH18, author = {Huiying Hou and Jia Yu and Rong Hao}, title = {Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {575--584}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p575-584.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HouYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuangCH18, author = {Li{-}Chin Huang and Ting{-}Yi Chang and Min{-}Shiang Hwang}, title = {A Conference Key Scheme Based on the Diffie-Hellman Key Exchange}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1221--1226}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1221-1226.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuangCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuangCLF18, author = {Jian{-}Hua Huang and Liang{-}Jie Chen and Fan{-}Chao Li and Ze Fang}, title = {Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1033--1041}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1033-1041.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuangCLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuangZH18, author = {Yi{-}Bo Huang and Qiu{-}Yu Zhang and Wen{-}Jin Hu}, title = {Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {206--216}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p206-216.pdf}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuangZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JacksonSK18, author = {Samuel Jackson and Jeremy Straub and Scott Kerlin}, title = {Exploring a Novel Cryptographic Solution for Securing Small Satellite Communications}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {988--997}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p988-997.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JacksonSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JananiM18, author = {V. S. Janani and M. S. K. Manikandan}, title = {An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {746--753}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p746-753.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JananiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JiangLT18, author = {Shaoquan Jiang and Min Li and Zailiang Tang}, title = {A New Scheme for Source-location Privacy in Wireless Sensor Networks}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {879--889}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p879-889.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JiangLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JiangWG18, author = {Chunlin Jiang and Shi{-}lan Wu and Ke Gu}, title = {New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {235--242}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p235-242.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JiangWG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JimG18, author = {Lincy Elizebeth Jim and Mark A. Gregory}, title = {A Grudger Based {AIS} Approach to Coerce Selfish Node Cooperation in {MANET}}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {914--922}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p914-922.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JimG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JoLLS18, author = {KwangHyok Jo and Weimin Lei and Zhaozheng Li and Xiaoshi Song}, title = {A Reversible Watermarking Algorithm in the Lossless Mode of {HEVC}}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {844--852}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p844-852.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JoLLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KadirL18, author = {Govand Salih Kadir and Ihsan Alshahib Lami}, title = {Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1022--1032}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1022-1032.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KadirL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KavithaM18, author = {P. Kavitha and Rajeswari Mukesh}, title = {Detection of Impersonation Attack in {MANET} Using Polynomial Reduction Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {381--389}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p381-389.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KavithaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KhashanK18, author = {Osama Ahmed Khashan and Nour Mahmoud Khafajah}, title = {Secure Stored Images Using Transparent Crypto Filter Driver}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1053--1060}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1053-1060.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KhashanK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KibiwottZOA18, author = {Kittur P. Kibiwott and Fengli Zhang and Anyembe Andrew Omala and Daniel Adu{-}Gyamfi}, title = {Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from {ABE}}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1149--1162}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1149-1162.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KibiwottZOA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KurniawanR18, author = {Ade Kurniawan and Imam Riadi}, title = {Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {836--843}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p836-843.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KurniawanR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LPS18, author = {Prakash G. L and Manish Prateek and Inder Singh}, title = {Data Verification Using Block Level Batch Auditing on Multi-cloud Server}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {702--709}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p702-709.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiCY18, author = {Celia Li and Helen Cheung and Cungang Yang}, title = {Secure and Efficient Authentication Protocol for Power System Computer Networks}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {337--344}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p337-344.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiLL18, author = {Chunhu Li and Guangchun Luo and Chunbao Li}, title = {A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1105--1114}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1105-1114.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiMZ18, author = {Sujuan Li and Yi Mu and Mingwu Zhang}, title = {Certificate-based Smooth Projective Hashing and Its Applications}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {266--277}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p266-277.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiSL18, author = {Yunfa Li and Yangyang Shen and Mingyi Li}, title = {A Credible Mechanism of Service about Data Resource in Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {754--761}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p754-761.pdf}, timestamp = {Wed, 27 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiWLC18, author = {Jianjun Li and Yun{-}He Wu and Chin{-}Feng Lee and Chin{-}Chen Chang}, title = {Generalized {PVO-K} Embedding Technique for Reversible Data Hiding}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {65--77}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p65-77.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiWLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiZX18, author = {Xiaodong Li and Cailan Zhou and Ning Xu}, title = {A Secure and Efficient Image Encryption Algorithm Based on {DNA} Coding and Spatiotemporal Chaos}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {110--120}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p110-120.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Lin18, author = {Tzu{-}Chun Lin}, title = {A Study of Non-Abelian Public Key}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {278--290}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p278-290.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Lin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Lin18a, author = {Li Lin}, title = {A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {983--987}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p983-987.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Lin18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuS18, author = {Shuang{-}Gen Liu and Xue{-}Jing Sun}, title = {A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {931--937}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p931-937.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LuXNQ18, author = {Gang Lu and Linyuan Xue and Xuyun Nie and Zhiguang Qin}, title = {Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {509--514}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p509-514.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LuXNQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LuXNQL18, author = {Gang Lu and Linyuan Xuan and Xuyun Nie and Zhiguang Qin and Bo Liu}, title = {Cubic Medium Field Equation Public Key Cryptosystem}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {472--477}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p472-477.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LuXNQL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LvLZM18, author = {Yanhui Lv and Kexin Liu and Deyu Zhang and Zhuo Miao}, title = {A Secure Routing Protocol Based on Reputation Mechanism}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {862--871}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p862-871.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LvLZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MaHPZ18, author = {Hua Ma and Xiaoyu Han and Ting Peng and Linchao Zhang}, title = {Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1074--1084}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1074-1084.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MaHPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MahtoY18, author = {Dindayal Mahto and Dilip Kumar Yadav}, title = {Performance Analysis of {RSA} and Elliptic Curve Cryptography}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {625--635}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p625-635.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MahtoY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MaityBK18, author = {Gitika Maity and Jaydeb Bhaumik and Anjan Kundu}, title = {A New {SPN} Type Architecture to Strengthen Block Cipher Against Fault Attack}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {455--462}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p455-462.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MaityBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MalikP18, author = {Arun Malik and Babita Pandey}, title = {Security Analysis of Discrete Event Based Threat Driven Authentication Approach in {VANET} Using Petri Nets}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {601--608}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p601-608.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MalikP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MeshramML18, author = {Chandrashekhar Meshram and Sarita Gajbhiye Meshram and Cheng{-}Chi Lee}, title = {Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {568--574}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p568-574.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MeshramML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MohamedAAZP18, author = {Kamsiah Mohamed and Fakariah Hani Hj Mohd Ali and Suriyani Ariffin and Nur Hafiza Zakaria and Mohd Nazran Mohammed Pauzi}, title = {An Improved {AES} S-box Based on Fibonacci Numbers and Prime Factor}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1206--1214}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1206-1214.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MohamedAAZP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MohamedWZ18, author = {Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang}, title = {Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {345--358}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p345-358.pdf}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/MohamedWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MohanCR18, author = {Naresh Babu Muthu Mohan and Ardhani Sathya Narayana Chakravarthy and Cherukuri Ravindranath}, title = {Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {217--224}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p217-224.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MohanCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MuruganS18, author = {K. Murugan and P. Suresh}, title = {Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {730--737}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p730-737.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MuruganS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MuthalaguJ18, author = {Raja Muthalagu and Subeen Jain}, title = {Application of {FSM} Machine and S-Box in {KASUMI} Block Cipher to Improve Its Resistance Against Attack}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {890--897}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p890-897.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MuthalaguJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Nezarat18, author = {Amin Nezarat}, title = {Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {56--64}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p56-64.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Nezarat18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/OkosunOB18, author = {Kazeem O. Okosun and Samson Ogunlade and Ebenezer Bonyah}, title = {Optimal Control Analysis of Computer Virus Transmission}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {971--982}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p971-982.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/OkosunOB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PadmavathiVK18, author = {V. Padmavathi and B. Vishnu Vardhan and Addepalli V. N. Krishna}, title = {Provably Secure Quantum Key Distribution By Applying Quantum Gate}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {88--94}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p88-94.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PadmavathiVK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PreethaC18, author = {V. Preetha and K. Chitra}, title = {{ZBMRP:} Zone Based {MANET} Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1115--1124}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1115-1124.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PreethaC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PurwantoKHR18, author = {Yudha Purwanto and Kuspriyanto and Hendrawan and Budi Rahardjo}, title = {Cost Analysis for Classification-based Autonomous Response Systems}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {121--130}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p121-130.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PurwantoKHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PutraMSKA18, author = {Septafiansyah Dwi Putra and Ma'muri and Sarwono Sutikno and Yusuf Kurniawan and Adang Suwandi Ahmad}, title = {Design of an {AES} Device as Device Under Test in a {DPA} Attack}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {256--265}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p256-265.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PutraMSKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RaisM18, author = {Helmi Md Rais and Tahir Mehmood}, title = {Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {184--192}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p184-192.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RaisM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RajaramaSS18, author = {Chitra Rajarama and Jagadeesha Narasimhamurthy Sugatoor and T. Yerri Swamy}, title = {Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {617--624}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p617-624.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RajaramaSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RasslanEA18, author = {Mohamed Rasslan and Ghada F. El{-}Kabbany and Heba Kamal Aslan}, title = {New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {371--380}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p371-380.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RasslanEA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RawatPJ18, author = {Ramesh Singh Rawat and Emmanuel S. Pilli and Ramesh Chandra Joshi}, title = {Survey of Peer-to-Peer Botnets and Detection Frameworks}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {547--557}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p547-557.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RawatPJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SangeethaK18, author = {V. Sangeetha and S. Swapna Kumar}, title = {Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1085--1092}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1085-1092.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SangeethaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SethiaSG18, author = {Divyashikha Sethia and Huzur Saran and Daya Gupta}, title = {{CP-ABE} for Selective Access with Scalable Revocation: {A} Case Study for Mobile-based Healthfolder}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {689--701}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p689-701.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SethiaSG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SinghJ18, author = {Umesh Kumar Singh and Chanchala Joshi}, title = {Scalable Approach Towards Discovery of Unknown Vulnerabilities}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {827--835}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p827-835.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SinghJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SivabalanR18, author = {Sujatha Sivabalan and Peter J. Radcliffe}, title = {Power Efficient Secure Web Servers}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {304--312}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p304-312.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SivabalanR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SivabalanR18a, author = {Sujatha Sivabalan and Peter J. Radcliffe}, title = {Feasibility of Eliminating {IDPS} Devices from a Web Server Farm}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {433--438}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p433-438.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SivabalanR18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SrinathC18, author = {M. Seshadri Srinath and Venkatachalam Chandrasekaran}, title = {Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {9--18}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p9-18.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SrinathC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SrinivasKR18, author = {Vegi Srinivas and Vatsavayi Valli Kumari and K. V. S. V. N. Raju}, title = {Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {951--959}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p951-959.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SrinivasKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Styugin18, author = {Mikhail Styugin}, title = {Establishing Systems Secure from Research with Implementation in Encryption Algorithms}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {35--40}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p35-40.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Styugin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SukumaranM18, author = {Sreeja Cherillath Sukumaran and Mohammed Misbahuddin}, title = {{DNA} Cryptography for Secure Data Storage in Cloud}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {447--454}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p447-454.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SukumaranM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TangWY18, author = {Dan Tang and Yaqiang Wang and Haopeng Yang}, title = {Array Erasure Codes with Preset Fault Tolerance Capability}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {193--200}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p193-200.pdf}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/TangWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TarekOA18, author = {Eman Tarek and Osama Ouda and Ahmed Atwan}, title = {Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1163--1174}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1163-1174.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TarekOA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TengL18, author = {Lin Teng and Hang Li}, title = {A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1200--1205}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1200-1205.pdf}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TengL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TengLLY18, author = {Lin Teng and Hang Li and Jie Liu and Shoulin Yin}, title = {An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {872--878}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p872-878.pdf}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TengLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TianST18, author = {Xiuxia Tian and Qian Song and Fuliang Tian}, title = {Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1137--1148}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1137-1148.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TianST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TsaiHH18, author = {Cheng{-}Yi Tsai and Pi{-}Fang Ho and Min{-}Shiang Hwang}, title = {A Secure Group Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {201--205}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p201-205.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TsaiHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TsaiYLH18, author = {Cheng{-}Yi Tsai and Cheng{-}Ying Yang and Iuon{-}Chang Lin and Min{-}Shiang Hwang}, title = {A Survey of E-book Digital Right Management}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {998--1004}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p998-1004.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TsaiYLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/UpadhyayK18, author = {Ranjit Kumar Upadhyay and Sangeeta Kumari}, title = {Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {515--526}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p515-526.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/UpadhyayK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/VaanchigXCQ18, author = {Nyamsuren Vaanchig and Hu Xiong and Wei Chen and Zhiguang Qin}, title = {Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority {CP-ABE} Scheme with Dual-Revocation}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {95--109}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p95-109.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/VaanchigXCQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/VeenaM18, author = {K. Veena and K. Meena}, title = {Identification of Cyber Criminal by Analysing the Users Profile}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {738--745}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p738-745.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/VeenaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangLW18, author = {Yanhua Wang and Yaqiu Liu and Kun Wang}, title = {A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {907--913}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p907-913.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangS18, author = {Xiaogang Wang and Weiren Shi}, title = {Secure Time Synchronization Protocol for Wireless Sensor Network Based on {\(\mathrm{\mu}\)}TESLA Protocol}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {536--546}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p536-546.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangSH18, author = {Yu{-}Lun Wang and Jau{-}Ji Shen and Min{-}Shiang Hwang}, title = {A Survey of Reversible Data Hiding for VQ-Compressed Images}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {1--8}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p1-8.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangSH18a, author = {Yu{-}Lun Wang and Jau{-}Ji Shen and Min{-}Shiang Hwang}, title = {A Novel Dual Image-based High Payload Reversible Hiding Technique Using {LSB} Matching}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {801--804}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p801-804.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangSH18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangZLWB18, author = {Qiuhua Wang and Hongxia Zhang and Qiuyun Lyu and Xiaojun Wang and Jianrong Bao}, title = {A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {439--446}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p439-446.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangZLWB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WeiY18, author = {Zhe Wei and Shuyan Yu}, title = {Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor Networks}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {496--501}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p496-501.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WeiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Wu18, author = {Xu Wu}, title = {Study on Trust Model for Multi-users in Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {674--682}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p674-682.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Wu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XieJL18, author = {Rui Xie and Bi{-}yuan Jian and Daowei Liu}, title = {An Improved Ownership Transfer for {RFID} Protocol}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {149--156}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p149-156.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XieJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XieLL18, author = {Rui Xie and Jie Ling and Daowei Liu}, title = {A Wireless Key Generation Algorithm for {RFID} System Based on Bit Operation}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {938--950}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p938-950.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XieLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XieQXLP18, author = {Bei Xie and Jiaohua Qin and Xuyu Xiang and Hao Li and Lili Pan}, title = {An Image Retrieval Algorithm Based on Gist and Sift Features}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {609--616}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p609-616.pdf}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/XieQXLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XuGH18, author = {Xiaolong Xu and Zhonghe Gao and Lijuan Han}, title = {An Efficient Compromised Nodes Detection System in Wireless Sensor Networks}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {960--970}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p960-970.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XuGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YangCZ18, author = {Wenjie Yang and Min{-}Rong Chen and Guo{-}Qiang Zeng}, title = {Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1194--1199}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1194-1199.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YangCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YangJGXW18, author = {Ming Yang and Rong Jiang and Tilei Gao and Wanyu Xie and Jia Wang}, title = {Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {664--673}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p664-673.pdf}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/YangJGXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YaoLWLM18, author = {Lili Yao and Jiabing Liu and Dejun Wang and Jing Li and Bo Meng}, title = {Formal Analysis of {SDN} Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1125--1136}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1125-1136.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YaoLWLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Zhang18, author = {Jialiang Zhang}, title = {Application of Artificial Intelligence Technology in Computer Network Security}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1016--1021}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1016-1021.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Zhang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Zhang18a, author = {Yun Zhang}, title = {Research on the Security Protection of E-Commerce Information under the Background of Mobile Consumption}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1215--1220}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1215-1220.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Zhang18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Zhang18b, author = {Lei Zhang}, title = {Supervision and Investigation of Internet Fraud Crimes}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1227--1233}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1227-1233.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Zhang18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangWW18, author = {Xueqin Zhang and Baoping Wang and Wei Wang}, title = {A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {390--395}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p390-395.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangY18, author = {Leyou Zhang and Hongjian Yin}, title = {Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {168--176}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p168-176.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoQ18, author = {Yongliang Zhao and Quan Qian}, title = {Android Malware Identification Through Visual Exploration of Disambly Files}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1061--1073}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1061-1073.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoSYZC18, author = {Hongzhuan Zhao and Dihua Sun and Hang Yue and Min Zhao and Senlin Cheng}, title = {Dynamic Trust Model for Vehicular Cyber-Physical Systems}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {1}, pages = {157--167}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n1/ijns-2018-v20-n1-p157-167.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoSYZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhouZW18, author = {Caixue Zhou and Yue Zhang and Lingmin Wang}, title = {A Provable Secure Identity-based Generalized Proxy Signcryption Scheme}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {6}, pages = {1183--1193}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1183-1193.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhouZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhuL18, author = {Hongfeng Zhu and Junlin Liu}, title = {Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {463--471}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p463-471.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhuL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhuW18, author = {Hongfeng Zhu and Rui Wang}, title = {A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {313--322}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p313-322.pdf}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZimbaCW18, author = {Aaron Zimba and Hongsong Chen and Zhaoshun Wang}, title = {Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {558--567}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p558-567.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZimbaCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZouWY18, author = {Lina Zou and Xueying Wang and Shoulin Yin}, title = {A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {3}, pages = {502--508}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p502-508.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZouWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Zuo18, author = {Cen Zuo}, title = {Defense of Computer Network Viruses Based on Data Mining Technology}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {4}, pages = {805--810}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n4/ijns-2018-v20-n4-p805-810.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Zuo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.