Security and Communication Networks

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9127612
  • - Research Article

Reliable Collaborative Filtering on Spatio-Temporal Privacy Data

Zhen Liu | Huanyu Meng | ... | Feng Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7536381
  • - Research Article

Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

Ru Zhang | Yanyu Huo | ... | Fangyu Weng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6430850
  • - Research Article

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

Qian Meng | Jianfeng Ma | ... | Tengfei Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4651395
  • - Research Article

Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks

Yang Zhou | Wei Ni | ... | Yixian Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3075210
  • - Research Article

Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

Shin-Yan Chiou | Tsung-Ju Wang | Jiun-Ming Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6898617
  • - Review Article

A Survey on Breaking Technique of Text-Based CAPTCHA

Jun Chen | Xiangyang Luo | ... | Daofu Gong
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8051728
  • - Research Article

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

Hao Chen | Tao Wang | ... | Yunfei Ma
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 9097616
  • - Research Article

Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark

Xing Guo | Shanshan Chen | ... | Wei Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9534754
  • - Research Article

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

Yi Liu | Hong-qi Zhang | ... | Ying-jie Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6207437
  • - Research Article

Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process

Ke Yin
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6097253
  • - Research Article

PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing

Ji Li | Jianghong Wei | ... | Xuexian Hu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2148534
  • - Research Article

Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

Shuai Han | Shengli Liu | Lin Lyu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4376282
  • - Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Keyang Liu | Weiming Zhang | Xiaojuan Dong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 9192084
  • - Research Article

Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation

Xiaona Xia | Jiguo Yu | ... | Shu Wu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 5960307
  • - Research Article

Detecting Web-Based Botnets Using Bot Communication Traffic Features

Fu-Hau Hsu | Chih-Wen Ou | ... | Po-Ching Lin
Security and Communication Networks
 Journal metrics
Acceptance rate30%
Submission to final decision84 days
Acceptance to publication38 days
CiteScore1.810
Impact Factor1.376
 Submit
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi