Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2489214
  • - Research Article

Large-Scale Analysis of Remote Code Injection Attacks in Android Apps

Hyunwoo Choi | Yongdae Kim
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5325040
  • - Review Article

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

Milad Taleby Ahvanooey | Qianmu Li | ... | Yanyan Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1781384
  • - Research Article

Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect

Barnali Gupta Banik | Samir Kumar Bandyopadhyay
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6063456
  • - Research Article

A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

Jean Caminha | Angelo Perkusich | Mirko Perkusich
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9062675
  • - Research Article

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

Chenyu Wang | Guoai Xu | Wenting Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2153195
  • - Research Article

Global Behavior of a Computer Virus Propagation Model on Multilayer Networks

Chunming Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9482345
  • - Research Article

A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs

Hongyu Wang | Jin Xu | ... | Hongyan Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5823230
  • - Research Article

To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers

Shahid Mahmood | Shabieh Farwa | ... | Sajjad Shaukat Jamal
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9675050
  • - Research Article

A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Emanuel Ferreira Jesus | Vanessa R. L. Chicarino | ... | Antônio A. de A. Rocha
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9701756
  • - Research Article

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Qi Zhang | An Wang | ... | Liehuang Zhu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 3580536
  • - Research Article

Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments

So Ryoung Park | Ilku Nam | Sanguk Noh
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5841967
  • - Research Article

Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing

Hongliang Zhu | Meiqi Chen | ... | Lei Hu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1525186
  • - Research Article

Analysis on Influential Functions in the Weighted Software Network

Haitao He | Chun Shan | ... | Guoyan Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5978636
  • - Review Article

Security and Privacy in the Medical Internet of Things: A Review

Wencheng Sun | Zhiping Cai | ... | Guoyan Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1591206
  • - Research Article

A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing

Rui Zhang | Di Xiao | Yanting Chang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.