Security and Communication Networks

Table of Contents

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 9289410
  • - Research Article

Building Secure Public Key Encryption Scheme from Hidden Field Equations

Yuan Ping | Baocang Wang | ... | Shengli Tian
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7369684
  • - Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Miguel Seijo Simó | Gregorio López López | José Ignacio Moreno Novella
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1308045
  • - Research Article

Automatic Reverse Engineering of Private Flight Control Protocols of UAVs

Ran Ji | Jian Wang | ... | Ruilin Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1404279
  • - Research Article

Adaptive Security of Broadcast Encryption, Revisited

Bingxin Zhu | Puwen Wei | Mingqiang Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3407642
  • - Research Article

Quantitative Method for Network Security Situation Based on Attack Prediction

Hao Hu | Hongqi Zhang | ... | Yongwei Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4321296
  • - Research Article

Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage

Juha Partala
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2524513
  • - Research Article

Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System

Waqas A. Imtiaz | Affaq Qamar | ... | Javed Iqbal
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 8026787
  • - Research Article

Privacy Preserved Self-Awareness on the Community via Crowd Sensing

Huiting Fan | Kai Xing | ... | Jing Xu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4286903
  • - Research Article

CLAS: A Novel Communications Latency Based Authentication Scheme

Zuochao Dou | Issa Khalil | Abdallah Khreishah
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 1076419
  • - Research Article

SCPR: Secure Crowdsourcing-Based Parking Reservation System

Changsheng Wan | Juan Zhang | Daoli Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3109624
  • - Research Article

Group Authentication with Multiple Trials and Multiple Authentications

Hung-Yu Chien
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6235484
  • - Research Article

Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices

Pieter Robyns | Bram Bonné | ... | Wim Lamotte
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5207386
  • - Research Article

Efficient Solutions to Two-Party and Multiparty Millionaires’ Problem

Xin Liu | Shundong Li | ... | Yong Zhou
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6158107
  • - Research Article

Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners

Mansour Alsaleh | Noura Alomar | ... | AbdulMalik Al-Salman
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4621587
  • - Research Article

PMCAP: A Threat Model of Process Memory Data on the Windows Operating System

Jiaye Pan | Yi Zhuang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit