Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4957045
  • - Research Article

Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption

Dianyan Xiao | Yang Yu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4724815
  • - Research Article

An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme

Lu Ou | Hui Yin | ... | Yupeng Hu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9756982
  • - Research Article

An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate

Yu Yao | Qiang Fu | ... | Chuan Sheng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7251750
  • - Research Article

Leverage Website Favicon to Detect Phishing Websites

Kang Leng Chiew | Jeffrey Soon-Fatt Choo | ... | Kelvin S. C. Yong
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9715947
  • - Research Article

Close to Optimally Secure Variants of GCM

Ping Zhang | Hong-Gang Hu | Qian Yuan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6238607
  • - Editorial

Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications

Xuyun Zhang | Julian Jang-Jaccard | ... | Chang Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6854612
  • - Research Article

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks

Jin Cao | Hui Li | ... | Fenghua Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2063089
  • - Research Article

A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors

Tianliang Lu | Lu Zhang | Yixian Fu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2975376
  • - Research Article

Defending against the Advanced Persistent Threat: An Optimal Control Approach

Pengdeng Li | Xiaofan Yang | ... | Yuan Yan Tang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6140978
  • - Research Article

Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

Ming Luo | Yi Luo | ... | Ze Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4216240
  • - Research Article

Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment

Ady Wahyudi Paundu | Doudou Fall | ... | Youki Kadobayashi
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6590928
  • - Research Article

Using Physical Context-Based Authentication against External Attacks: Models and Protocols

Wilson S. Melo | Raphael C. S. Machado | Luiz F. R. C. Carmo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 8214619
  • - Research Article

Quantum Cryptography for the Future Internet and the Security Analysis

Tianqi Zhou | Jian Shen | ... | Jun Shen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9178425
  • - Research Article

NOSArmor: Building a Secure Network Operating System

Hyeonseong Jo | Jaehyun Nam | Seungwon Shin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8370341
  • - Review Article

A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

Baraka D. Sija | Young-Hoon Goo | ... | Myung-Sup Kim
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.