Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6648257
  • - Research Article

[Retracted] Research on Transmission Line Fault Location Based on the Fusion of Machine Learning and Artificial Intelligence

Xiao-Wei Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5549309
  • - Research Article

[Retracted] Analysis of Characteristics of Tennis Singles Matches Based on 5G and Data Mining Technology

Ming Li | Qinsheng Li | ... | Lei Guo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6617944
  • - Research Article

Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm

Hira Nazir | Imran Sarwar Bajwa | ... | Muhammad Moosa
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5573886
  • - Research Article

Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments

Yuting Li | Qingfeng Cheng | Wenbo Shi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6689448
  • - Research Article

Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things

Teng Li | Jiawei Zhang | ... | Jianfeng Ma
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6646445
  • - Research Article

Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing

Jiawei Zhang | Jianfeng Ma | ... | Qi Jiang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6695858
  • - Research Article

Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection

Songjie Wei | Zedong Zhang | ... | Pengfei Jiang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5556634
  • - Research Article

Improved CNN-Based Hashing for Encrypted Image Retrieval

Wenyan Pan | Meimin Wang | ... | Zhili Zhou
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6661450
  • - Research Article

Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating

Jie Ling | Junwei Chen | ... | Wensheng Gan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6615512
  • - Research Article

Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment

Ahmad Alanezi | Bassem Abd-El-Atty | ... | Hany S. Khalifa
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6643763
  • - Research Article

Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms

Binjie Chen | Fushan Wei | Chunxiang Gu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6618363
  • - Research Article

Spectral Efficiency of the Multiway Massive System over Rician Fading Channels

Junyi He | Junnan Zhang | ... | Mengxiang Wu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6613392
  • - Research Article

A New Password- and Position-Based Authenticated Key Exchange

Jia Fan | Lanfei Qiao | ... | Lin Tang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6615708
  • - Research Article

A Robust and Fast Image Encryption Scheme Based on a Mixing Technique

Lee Mariel Heucheun Yepdia | Alain Tiedeu | Guillaume Kom
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6670847
  • - Research Article

An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things

Fengyin Li | Pei Ren | ... | Huiyu Zhou
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.