Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4248092
  • - Research Article

Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition

Qilong Han | Zuobin Xiong | Kejia Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6315039
  • - Research Article

Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications

Muhammad Bilal | Muhammad Asif | Abid Bashir
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2193897
  • - Research Article

A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments

Cheolhee Park | Hyunil Kim | ... | Changho Seo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 3723691
  • - Research Article

Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things

Weiwei Lin | Hongwei Zeng | ... | Xiaolin Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 3205898
  • - Research Article

ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification

Baoyuan Kang | Lin Si | ... | Mingming Xie
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1265352
  • - Research Article

Privacy Preservation for Friend-Recommendation Applications

Weicheng Wang | Shengling Wang | Jianhui Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1572812
  • - Research Article

Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism

Samira Haguouche | Zahi Jarir
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8402578
  • - Research Article

An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map

Guodong Ye | Kaixin Jiao | ... | Xiaoling Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8738960
  • - Research Article

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key

Jiguo Li | Shengzhou Hu | Yichen Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7139391
  • - Research Article

A Relative Phase Based Audio Integrity Protection Method: Model and Strategy

Zhaozheng Li | Weimin Lei | ... | Kwanghyok Jo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6909703
  • - Research Article

FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things

Youwen Zhu | Yue Zhang | ... | Xianmin Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2329891
  • - Research Article

An Improved Permission Management Scheme of Android Application Based on Machine Learning

Shaozhang Niu | Ruqiang Huang | ... | Yiming Xue
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5037892
  • - Research Article

A Secure Multimedia Data Sharing Scheme for Wireless Network

Liming Fang | Liang Liu | ... | Maosheng Sun
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 3130652
  • - Research Article

Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS

Weizhong Qiang | Shizhen Wang | ... | Jiangying Zhong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6395362
  • - Research Article

A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network

Chunpeng Ge | Jinyue Xia | ... | Yao Wang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.