Security and Communication Networks

Table of Contents

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9127612
  • - Research Article

Reliable Collaborative Filtering on Spatio-Temporal Privacy Data

Zhen Liu | Huanyu Meng | ... | Feng Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7536381
  • - Research Article

Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

Ru Zhang | Yanyu Huo | ... | Fangyu Weng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6430850
  • - Research Article

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

Qian Meng | Jianfeng Ma | ... | Tengfei Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4651395
  • - Research Article

Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks

Yang Zhou | Wei Ni | ... | Yixian Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3075210
  • - Research Article

Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature

Shin-Yan Chiou | Tsung-Ju Wang | Jiun-Ming Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6898617
  • - Review Article

A Survey on Breaking Technique of Text-Based CAPTCHA

Jun Chen | Xiangyang Luo | ... | Daofu Gong
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8051728
  • - Research Article

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

Hao Chen | Tao Wang | ... | Yunfei Ma
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 9097616
  • - Research Article

Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark

Xing Guo | Shanshan Chen | ... | Wei Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9534754
  • - Research Article

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

Yi Liu | Hong-qi Zhang | ... | Ying-jie Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6207437
  • - Research Article

Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process

Ke Yin
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6097253
  • - Research Article

PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing

Ji Li | Jianghong Wei | ... | Xuexian Hu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2148534
  • - Research Article

Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

Shuai Han | Shengli Liu | Lin Lyu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4376282
  • - Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Keyang Liu | Weiming Zhang | Xiaojuan Dong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 9192084
  • - Research Article

Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation

Xiaona Xia | Jiguo Yu | ... | Shu Wu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 5960307
  • - Research Article

Detecting Web-Based Botnets Using Bot Communication Traffic Features

Fu-Hau Hsu | Chih-Wen Ou | ... | Po-Ching Lin
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit