Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5051270
  • - Research Article

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking

Weiwei Liu | Guangjie Liu | ... | Yuewei Dai
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6868506
  • - Research Article

Research on Plaintext Restoration of AES Based on Neural Network

Xinyi Hu | Yaqun Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5783976
  • - Research Article

Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method

Zhendong Wu | Jiajia Yang | ... | Hengli Yue
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 3210207
  • - Research Article

A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs

Rutvij H. Jhaveri | Aneri Desai | ... | Yubin Zhong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 8392080
  • - Research Article

A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN

Haosu Cheng | Jianwei Liu | ... | Jingdong Bian
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9583982
  • - Research Article

A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model

Ke Yin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1914980
  • - Research Article

Network Intrusion Detection Method Based on PCA and Bayes Algorithm

Bing Zhang | Zhiyang Liu | ... | Xiaolin Zhao
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6712065
  • - Research Article

A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD

Imen Nouioua | Nouredine Amardjia | Sarra Belilita
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4963932
  • - Research Article

A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord

Riccardo Pecori | Luca Veltri
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9802475
  • - Research Article

RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys

Rahul Saha | G. Geetha | ... | Tai-hoon Kim
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2462901
  • - Research Article

A General Architecture for Multiserver Authentication Key Agreement with Provable Security

Yunru Zhang | Min Luo | ... | Debiao He
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2506319
  • - Research Article

Behaviors of High-Frequency Subscribers in Cellular Data Networks

Jingtao Li | Yang Liu | ... | Zhen Cao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6829326
  • - Research Article

RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network

Jinquan Zhang | Yanfeng Yuan | ... | Mengmeng Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4853134
  • - Research Article

System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos

Octavio Flores Siordia | Juan Carlos Estrada Gutiérrez | ... | Maricela Jiménez Rodríguez
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6563089
  • - Research Article

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Uğur Coruh | Oğuz Bayat
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.