Security and Communication Networks

Table of Contents

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7129505
  • - Review Article

Privacy-Preserving Biometric Authentication: Challenges and Directions

Elena Pagnin | Aikaterini Mitrokotsa
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3261058
  • - Research Article

A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

Mahmoud Khasawneh | Anjali Agarwal
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7042835
  • - Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Fusheng Wu | Huanguo Zhang | ... | Shi Yuan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7323158
  • - Research Article

Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups

Jie Zhang | Jie Chen | ... | Chuangui Ma
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6047053
  • - Research Article

Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection

Rafał Kozik | Michał Choraś
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2041842
  • - Erratum

Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”

Guomin Zhou | Peng Zeng | ... | Kim-Kwang Raymond Choo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 3659167
  • - Research Article

CHAOS: An SDN-Based Moving Target Defense System

Yuan Shi | Huanguo Zhang | ... | Bo Zhao
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8051389
  • - Research Article

Segmentation Based Video Steganalysis to Detect Motion Vector Modification

Peipei Wang | Yun Cao | Xianfeng Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4892814
  • - Research Article

Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability

Yanli Ren | Min Dong | ... | Xiaoni Du
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8575842
  • - Research Article

ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks

Iván García-Magariño | Raquel Lacuesta
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3691629
  • - Research Article

Low-Rate DDoS Attack Detection Using Expectation of Packet Size

Lu Zhou | Mingchao Liao | ... | Haoyu Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3834685
  • - Research Article

Fault Attack on the Authenticated Cipher ACORN v2

Xiaojuan Zhang | Xiutao Feng | Dongdai Lin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2713595
  • - Research Article

CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy

Nurmamat Helil | Kaysar Rahman
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1378128
  • - Research Article

Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

Jongho Moon | Youngsook Lee | ... | Dongho Won
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5437403
  • - Research Article

How to Share Secret Efficiently over Networks

Lein Harn | Ching-Fang Hsu | ... | Junwei Zhou
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit