Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2708532
  • - Research Article

A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy

Chong Fu | Gao-yuan Zhang | ... | Wei-min Lei
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1308678
  • - Research Article

Validating User Flows to Protect Software Defined Network Environments

Ihsan H. Abdulqadder | Deqing Zou | ... | Bin Yuan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5160237
  • - Research Article

Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques

Zhihui Chu | Huaifeng Chen | ... | Lu Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7178164
  • - Review Article

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

Michele De Donno | Nicola Dragoni | ... | Angelo Spognardi
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4519548
  • - Research Article

Iris Template Protection Based on Local Ranking

Dongdong Zhao | Shu Fang | ... | Shengwu Xiong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1746809
  • - Research Article

International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework

ByungRae Cha | Sun Park | ... | JuHyun Shin
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1326235
  • - Research Article

Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Xianyi Chen | Haidong Zhong | ... | Zhihua Xia
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9803519
  • - Research Article

Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain

Ming Li | Haiju Fan | ... | Yang Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 3182402
  • - Research Article

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing

Shuang Zhao | Xiapu Luo | ... | Xinliang Qiu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7080673
  • - Research Article

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

Junhui He | Junxi Chen | ... | Shaohua Tang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8053967
  • - Research Article

Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services

Chenglong Cao | Xiaoling Zhu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7963641
  • - Research Article

On the Antijamming Performance of the NR-DCSK System

Binh Van Nguyen | Hyoyoung Jung | Kiseon Kim
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2516324
  • - Research Article

Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction

Dongmei Niu | Hongxia Wang | ... | Canghong Shi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2369507
  • - Research Article

Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware?

Haibo Yi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1734961
  • - Research Article

Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification

Dawen Xu | Kai Chen | ... | Shubing Su
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.