Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 2046735
  • - Research Article

Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

Geovandro C. C. F. Pereira | Renan C. A. Alves | ... | Cíntia B. Margi
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9017039
  • - Research Article

Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems

Jiajun Shen | Dongqin Feng
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1869787
  • - Research Article

Locality-Based Visual Outlier Detection Algorithm for Time Series

Zhihua Li | Ziyuan Li | ... | Steven Wen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5989151
  • - Research Article

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments

Ruhul Amin | SK Hafizul Islam | ... | Saru Kumari
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4746586
  • - Research Article

Research on a New Signature Scheme on Blockchain

Chao Yuan | Mi-xue Xu | Xue-ming Si
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 9602357
  • - Research Article

F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems

Jingxuan Wang | Lucas C. K. Hui | ... | Ruoqing Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 1790268
  • - Research Article

Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

Chun-Juan Ouyang | Ming Leng | ... | Huan Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7616847
  • - Research Article

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

Rameez Asif | William J. Buchanan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7576307
  • - Research Article

Location Privacy Leakage through Sensory Data

Yi Liang | Zhipeng Cai | ... | Yingshu Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6426495
  • - Research Article

Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

Qinlong Huang | Licheng Wang | Yixian Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1924618
  • - Research Article

Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks

Anita Pradhan | K. Raja Sekhar | Gandharba Swain
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8405879
  • - Research Article

Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

Caixue Zhou | Zhiqiang Zhao | ... | Yuan Mei
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1915239
  • - Research Article

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

Guomin Zhou | Peng Zeng | ... | Kim-Kwang Raymond Choo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4364376
  • - Research Article

LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks

Song Li | Jie Cui | ... | Qiang He
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1619741
  • - Research Article

Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card

Chenyu Wang | Guoai Xu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.