Security and Communication Networks

Table of Contents

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4267921
  • - Research Article

Differential Privacy for Edge Weights in Social Networks

Xiaoye Li | Jing Yang | ... | Jianpei Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 6102780
  • - Research Article

Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks

Peng Li | Xiaotian Yu | ... | Huqing Nie
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5084636
  • - Research Article

A Privacy Model for RFID Tag Ownership Transfer

Xingchun Yang | Chunxiang Xu | Chaorong Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7589306
  • - Research Article

Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo

Guoyong Han | Wenying Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5397082
  • - Research Article

A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information

A. Soria-Lorente | S. Berres
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 1560594
  • - Research Article

An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

Zheng Zhao | Fenlin Liu | Daofu Gong
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8981606
  • - Research Article

An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents

Chien-Hua Tsai | Pin-Chang Su
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 5454768
  • - Research Article

Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling

Mohammad Ali Nematollahi | Chalee Vorakulpipat | Hamurabi Gamboa Rosales
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3825373
  • - Research Article

Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

Asish Kumar Dalai | Sanjay Kumar Jena
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2459780
  • - Research Article

The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms

Trong-Minh Hoang | Van-Kien Bui | Thanh-Tra Nguyen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 9130683
  • - Research Article

Protecting Information with Subcodstanography

Mirko Köhler | Ivica Lukić | Višnja Križanović Čik
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6907146
  • - Research Article

Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

Ahmad Samer Wazan | Romain Laborde | ... | Adib Habbal
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6758618
  • - Research Article

Certificateless Public Auditing Protocol with Constant Verification Time

Dongmin Kim | Ik Rae Jeong
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4975302
  • - Research Article

Dynamic Rule Encryption for Mobile Payment

Emir Husni
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3413567
  • - Research Article

Security Analysis of a Certificateless Signature from Lattices

Seunghwan Chang | Hyang-Sook Lee | ... | Seongan Lim
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit