Security and Communication Networks

Table of Contents

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1869787
  • - Research Article

Locality-Based Visual Outlier Detection Algorithm for Time Series

Zhihua Li | Ziyuan Li | ... | Steven Wen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5989151
  • - Research Article

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments

Ruhul Amin | SK Hafizul Islam | ... | Saru Kumari
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4746586
  • - Research Article

Research on a New Signature Scheme on Blockchain

Chao Yuan | Mi-xue Xu | Xue-ming Si
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 9602357
  • - Research Article

F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems

Jingxuan Wang | Lucas C. K. Hui | ... | Ruoqing Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 1790268
  • - Research Article

Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

Chun-Juan Ouyang | Ming Leng | ... | Huan Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7616847
  • - Research Article

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

Rameez Asif | William J. Buchanan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7576307
  • - Research Article

Location Privacy Leakage through Sensory Data

Yi Liang | Zhipeng Cai | ... | Yingshu Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6426495
  • - Research Article

Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

Qinlong Huang | Licheng Wang | Yixian Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1924618
  • - Research Article

Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks

Anita Pradhan | K. Raja Sekhar | Gandharba Swain
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8405879
  • - Research Article

Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

Caixue Zhou | Zhiqiang Zhao | ... | Yuan Mei
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1915239
  • - Research Article

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

Guomin Zhou | Peng Zeng | ... | Kim-Kwang Raymond Choo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4364376
  • - Research Article

LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks

Song Li | Jie Cui | ... | Qiang He
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1619741
  • - Research Article

Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card

Chenyu Wang | Guoai Xu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 1923476
  • - Research Article

MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data

Zhu Xiangyang | Dai Hua | ... | Li Xiao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4796373
  • - Research Article

NFC Secure Payment and Verification Scheme with CS E-Ticket

Kai Fan | Panfei Song | ... | Chao Yang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit