Security and Communication Networks

Table of Contents

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4603237
  • - Research Article

Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud

Tengfei Tu | Lu Rao | ... | Jia Xiao
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5746976
  • - Research Article

Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG

Mahdi Madani | Ilyas Benkhaddra | ... | Loic Sieler
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 2761486
  • - Research Article

A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks

Feng Li | Yali Si | ... | Limin Shen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6435138
  • - Research Article

Multiuser Searchable Encryption with Token Freshness Verification

Dhruti Sharma | Devesh C. Jinwala
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9150965
  • - Review Article

Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends

Mikel Iturbe | Iñaki Garitano | ... | Roberto Uribeetxeberria
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4167549
  • - Research Article

Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

Tong Li | Yuhui Zheng | Ti Zhou
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6760532
  • - Research Article

Protecting Private Data by Honey Encryption

Wei Yin | Jadwiga Indulska | Hongjian Zhou
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5101934
  • - Research Article

A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map

Abdul Razaq | Awais Yousaf | ... | Adil Waheed
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5704865
  • - Research Article

Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC

Wenjie Yang | Jian Weng | ... | Anjia Yang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 5618742
  • - Editorial

Security and Privacy in Emerging Wireless Networks

Qing Yang | Rongxing Lu | ... | Maryline Laurent
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4184196
  • - Research Article

Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders

Yang Yu | Jun Long | Zhiping Cai
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 1897438
  • - Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Yujia Liu | Weiming Zhang | Nenghai Yu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4749085
  • - Research Article

A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT

Vishal Sharma | Kyungroul Lee | ... | Sun-Young Lee
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 8408253
  • - Research Article

An Edge Correlation Based Differentially Private Network Data Release Method

Junling Lu | Zhipeng Cai | ... | Zhuojun Duan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7819590
  • - Research Article

Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine

Ming-Hung Wang | Han-Chi Wang | ... | Chin-Laung Lei
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit