Security and Communication Networks

Table of Contents: 2021

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6629433
  • - Research Article

Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing

Zhen Zhang | Bing Guo | ... | Hong Su
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6615899
  • - Review Article

Use of Security Logs for Data Leak Detection: A Systematic Literature Review

Ricardo Ávila | Raphaël Khoury | ... | Fábio Petrillo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5537041
  • - Research Article

An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding

Zhongguo Yang | Irshad Ahmed Abbasi | ... | Mingzhu Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6631247
  • - Research Article

Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure

Yunzhe Tian | Jiqiang Liu | ... | Wei Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5567610
  • - Research Article

[Retracted] Research on the Credibility of Social Media Information Based on User Perception

Jiaxi Sun
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6621760
  • - Research Article

Genetic Feature Fusion for Object Skeleton Detection

Yang Qiao | Yunjie Tian | ... | Jianbin Jiao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6697295
  • - Research Article

A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology

Yuanju Gan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5536170
  • - Research Article

A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption

Chirag Sharma | Bagga Amandeep | ... | Mohammad Shabaz
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6633250
  • - Research Article

ETCC: Encrypted Two-Label Classification Using CNN

Yan Li | Yifei Lu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5533376
  • - Research Article

[Retracted] An Exploratory Research on Constructing a Model of Innovation and Entrepreneurship Education for College Students Based on Fuzzy Neural Network Algorithm

Chen Hao
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6668498
  • - Research Article

A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme

Yihang Song | Songfan Li | ... | Li Lu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 8836757
  • - Research Article

Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface

Jie Yang | Xinsheng Ji | ... | Yi Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6679288
  • - Research Article

A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture

Pengcheng He | Kehui Sun | Congxu Zhu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 8823787
  • - Research Article

Efficient GSW-Style Fully Homomorphic Encryption over the Integers

Jianan Zhao | Ruwei Huang | Bo Yang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5511252
  • - Research Article

[Retracted] Research on the Performance of Impressionist Painting Color Visual Communication Based on Wireless Communication and Machine Vision

Jun Lin
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.