Security and Communication Networks

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7921782
  • - Research Article

Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications

Xiaoming Hu | Wenan Tan | ... | Chuang Ma
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5838657
  • - Research Article

An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

Yiqin Lu | Meng Wang | Pengsen Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7367518
  • - Research Article

Two-Phase Image Encryption Scheme Based on FFCT and Fractals

Mervat Mikhail | Yasmine Abouelseoud | Galal ElKobrosy
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1701243
  • - Research Article

Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks

Probidita Roychoudhury | Basav Roychoudhury | Dilip Kumar Saikia
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9863032
  • - Research Article

GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

Mahalakshmi Gunasekaran | Subathra Periakaruppan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1531928
  • - Research Article

Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks

Murat Dener | Omer Faruk Bay
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9040518
  • - Research Article

A Chaos-Based Authenticated Cipher with Associated Data

Je Sen Teh | Azman Samsudin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7903198
  • - Research Article

Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras

Hector Santoyo-Garcia | Eduardo Fragoso-Navarro | ... | Mariko Nakano-Miyatake
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9036382
  • - Research Article

Novel Noncommutative Cryptography Scheme Using Extra Special Group

Gautam Kumar | Hemraj Saini
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6729896
  • - Research Article

A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images

Jeyamala Chandrasekaran | S. J. Thiruvengadam
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1467614
  • - Research Article

A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

Nishaal J. Parmar | Pramode K. Verma
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1096463
  • - Research Article

A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models

Yuan-Yu Tsai | Tsung-Chieh Cheng | Yao-Hsien Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2057260
  • - Review Article

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

Chalee Vorakulpipat | Soontorn Sirapaisan | ... | Visut Savangsuk
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2503153
  • - Research Article

Cloud Service Scheduling Algorithm Research and Optimization

Hongyan Cui | Xiaofei Liu | ... | Zongguo Xia
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6216078
  • - Research Article

A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

Dhanalakshmi Krishnan Sadhasivan | Kannapiran Balasubramanian
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.