Search Symbol (Half-width) Description of Search Symbols
Space "AND" indicates the intertwining of key terms used in a search
Double Quotation Marks ("") ( " " ) Double quotation marks indicate the beginning and end of a phrase, and the search will only include terms that appear in the same order of those within the quotations. Example: "image process" : " image process "
? Indicates a variable letter. Entering two ? will indicate two variable letters, and so on. Example: "Appl?", search results will yield apple, apply… e , appl y … ( (often used to English word searches) )
* Indicates an unlimited number of variable letters to follow, from 1~n. Example: Enter "appl*", search results will yield apple, apples, apply, applied, application…(often used in English word searches) e , appl es , appl y , appl ied , appl ication … ( (often used to English word searches) )

Boolean logic combinations of key words is a skill used to expand or refine search parameters.
(1) AND (1) AND: Refines search parameters
(2) OR (2) OR: Expands search parameters (3) NOT: Excludes irrelevant parameters


DOI stands for Digital Object Identifier ( D igital O bject I dentifier ) ,
and is the unique identifier for objects on the internet. It can be used to create persistent link and to cite articles.

Using DOI as a persistent link

To create a persistent link, add「http://dx.doi.org/」 「 http://dx.doi.org/ 」 before a DOI.
For instance, if the DOI of an article is 10.5297/ser.1201.002 , you can link persistently to the article by entering the following link in your browser: http://dx.doi.org/ 10.5297/ser.1201.002
The DOI link will always direct you to the most updated article page no matter how the publisher changes the document's position, avoiding errors when engaging in important research.

Cite a document with DOI

When citing references, you should also cite the DOI if the article has one. If your citation guideline does not include DOIs, you may cite the DOI link.

DOIs allow accurate citations, improve academic contents connections, and allow users to gain better experience across different platforms. Currently, there are more than 70 million DOIs registered for academic contents. If you want to understand more about DOI, please visit airiti DOI Registrationdoi.airiti.com ) 。



Data Source: Academic Citation Index (ACI)
As Taiwan's largest Citation Index, we currently have on record all Humanities, and Sociology journals that were published in Taiwan. The number of periodicals that are published on a regular basis total around 400 different types. If periodicals that were added to the collection but then halted are counted as well, the number of periodicals total over 500 types. Every year we announce the recorded periodicals' impact factor, etc. to the public, and allow scholars utilize our materials to carry out academic research for free.

Impact Factor: The statistic indicating the average number of times a journal's articles published in the past two years have been cited in the counting year.
Formula: (Number of cites in counting year to articles published in the span of two years ) ÷ (Number of articles published in the span of two years)
Example: The impact factor in 2010 (determined in 2011)
In 2009, Journal A published 15 articles, and these 15 articles were cited 20 times in 2010.
In 2008, Journal A published 16 articles, and these 16 articles were cited 30 times in 2010.
→ →2010's Impact Factor = (20+30) ÷ (15+16) = 1.61 =(20+30)÷(15+16)≒1.61


What is "Preprint"?

In order to provide readers the forefront academic information, after articles are accepted to publish in the journal, we publish them in network before they're printed. Those "on-line first articles" are called the "preprint articles". The preprint articles do not have volume No., page No., publication date, but can be identified by the DOI number. 「 http://dx.doi.org/ 」 Link to the latest version of the article.

How to cite Preprint Articles?

Please use the online publication date and the DOI number of the preprint article to cite the literature.

Cited example (may vary with different formats you cited):

Author name. Article name. Journal name. YYYY/MM/DD online publish in advance.

doi:DOI Number




Chinese/English Abstract :


Times Cited :

1816-353X, Bimonthly Periodical,Regular Release

DOI : 10.6633/IJNS

Index Collection: : EI , Scopus

Title Changes List
  • International Journal of Network Security

    2005 / 07 - 2019 / 11(Regular Release)

All Volumes
Basic Information

Language : English

Available From: : 1 卷 1 期

Basic & Applied Sciences> Information Science




捷頂科技有限公司 Publishing 』

Previous Page12Next Page
Most Recently Published/Page #
Full-Text Files at the Top
Most Recently Published/Page #
Sort by Ascending Titles

A Study of Conjunctive Keyword Searchable Schemes

Cheng-Chi LeeShih-Ting HsuMin-Shiang Hwang

PECKSconjunctive keyword searchableoffline keyword-guessing attackkeyword field

10.6633/IJNS.201309.15(5).01 DOI

Abstract | Times Cited(2) Download Download PDF Add to Cart Add to Cart Track Track


Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks

B. Sathish BabuJayashree NPallapa Venkataram

Communication overheadcomputation costdata privacydecentralizationsecuritySteiner tree

10.6633/IJNS.201309.15(5).02 DOI

Abstract | Times Cited(1) Unauthorized Unauthorized Track Track


Key Generation Protocol in IBC

Dhruti SharmaDevesh Jinwala

Bilinear pairingidentity based cryptographykey escrow problemkey generation centerkey privacy authority

10.6633/IJNS.201309.15(5).03 DOI

Abstract | Times Cited(8) Download Download PDF Add to Cart Add to Cart Track Track


Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards

De-Biao HeWei-Jing ZhaoShu-Hua Wu

Attackauthenticationdynamic IDmulti-server systempasswordsmart cards

10.6633/IJNS.201309.15(5).04 DOI

Abstract Download Download PDF Add to Cart Add to Cart Track Track


ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve

Jayaprakash Kar

Deniable authenticationECDLPECDHPHDDHP

10.6633/IJNS.201309.15(5).05 DOI

Abstract Download Download PDF Add to Cart Add to Cart Track Track


A Semi-Fragile Image Content Authentication Technique Based on Secure Hash in Frequency Domain

P. D. Sheba Kezia Malarchelvi

Image content authenticationintegrityorthogonal polynomialsinter-coefficient relationship

10.6633/IJNS.201309.15(5).06 DOI

Abstract Download Download PDF Add to Cart Add to Cart Track Track


Wireless Honeypot: Framework, Architectures and Tools

Radhika GoelAnjali SardanaR. C. Joshi

Deceptiondetectionhoneypotsnetwork securitysurveywireless

10.6633/IJNS.201309.15(5).07 DOI

Abstract Unauthorized Unauthorized Track Track


Security Analysis of a Suite of Deniable Authentication Protocols

Hai-Bo TianXiao-Feng ChenBao-Dian WeiYi Liu

Deniable authentication protocolssecurity analysisByzantine attack

10.6633/IJNS.201309.15(5).08 DOI

Abstract Unauthorized Unauthorized Track Track


A Survey on Various Cyber Attacks and Their Classification

M. UmaG. Padmavathi

Active attackscyber attackscyber espionagecyber terrorismcyber wardenial of service attackspassive attacks

10.6633/IJNS.201309.15(5).09 DOI

Abstract | Times Cited(43) Download Download PDF Add to Cart Add to Cart Track Track


Security for Mobile Operators in Practice

Christos K. Dimitriadis

Mobile operatorssecurityvulnerabilities

10.6633/IJNS.201309.15(5).10 DOI

Abstract | Times Cited(21) Download Download PDF Add to Cart Add to Cart Track Track

Most Recently Published/Page #
Full-Text Files at the Top
Most Recently Published/Page #
Sort by Ascending Titles
Total 2 Pages
Previous Page12Next Page