Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6652606
  • - Research Article

Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage

Guangjun Liu | Wangmei Guo | ... | Jinbo Xiong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5568351
  • - Research Article

A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency

Peisong He | Hongxia Wang | ... | Yue Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6697155
  • - Research Article

A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services

Yurong Luo | Hui Li | ... | Zhenyang Guo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5577514
  • - Research Article

Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network

Jianglong Yang | Wanlin Yang | ... | Li Zhou
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5593178
  • - Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Yao Du | Mengtian Cui | Xiaochun Cheng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9949204
  • - Research Article

Compressed Wavelet Tensor Attention Capsule Network

Xiushan Liu | Chun Shan | ... | Peng Xu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5510481
  • - Research Article

[Retracted] An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm

Zhongqiang Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6632747
  • - Research Article

SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things

Tidiane Sylla | Mohamed Aymen Chalouf | ... | Karim Samaké
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 5551249
  • - Research Article

Quantum Election Protocol Based on Quantum Public Key Cryptosystem

Wenhua Gao | Li Yang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5558873
  • - Research Article

Reversible Privacy Protection with the Capability of Antiforensics

Liyun Dou | Zichi Wang | ... | Guorui Feng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5574415
  • - Research Article

Differential Privacy Location Protection Scheme Based on Hilbert Curve

Jie Wang | Feng Wang | Hongtao Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5594468
  • - Research Article

[Retracted] DDoS Detection Using a Cloud-Edge Collaboration Method Based on Entropy-Measuring SOM and KD-Tree in SDN

Yuhua Xu | Yunfeng Yu | ... | Zhixin Sun
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6625579
  • - Research Article

A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model

Zhuo Liu | Yong Wang | ... | Jun Ma
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5563868
  • - Review Article

A Bibliometric Analysis of Edge Computing for Internet of Things

Yiou Wang | Fuquan Zhang | ... | Bo Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5553490
  • - Research Article

[Retracted] Theory and Application of Weak Signal Detection Based on Stochastic Resonance Mechanism

Lin Cui | Junan Yang | ... | Hui Liu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.