Security and Communication Networks

Table of Contents

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5790189
  • - Research Article

A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding

Naveed Ahmed Azam
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7571201
  • - Research Article

Revocable ID-Based Signature with Short Size over Lattices

Ying-Hao Hung | Yuh-Min Tseng | Sen-Shan Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5421046
  • - Review Article

Phishing Detection: Analysis of Visual Similarity Based Approaches

Ankit Kumar Jain | B. B. Gupta
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3596205
  • - Research Article

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length

Jiguo Li | Fengjie Sha | ... | Jian Shen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5350201
  • - Research Article

Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

Dapeng Man | Wu Yang | ... | Xiaojiang Du
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6790975
  • - Research Article

Improved Instance Selection Methods for Support Vector Machine Speed Optimization

Andronicus A. Akinyelu | Aderemi O. Adewumi
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit