Security and Communication Networks

Table of Contents: 2022

  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 9709601
  • - Research Article

An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security

Wajih El Hadj Youssef | Ali Abdelli | ... | Mohsen Machhout
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2366632
  • - Research Article

[Retracted] Electronic Health Record Monitoring System and Data Security Using Blockchain Technology

Kazi Tamzid Akhter Md Hasib | Ixion Chowdhury | ... | Sami Bourouis
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 6705948
  • - Research Article

Certificateless Reliable and Privacy-Preserving Auditing of Group Shared Data for FOG-CPSs

Manohar Sai Burra | Soumyadev Maity
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4827956
  • - Research Article

Game-Based Channel Selection for UAV Services in Mobile Edge Computing

Y. Chen | H. Xing | ... | J. Huang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9329715
  • - Research Article

[Retracted] Sharpening and Detection of Road Studs for Intelligent Vehicles at Nighttime

Muhammad Hameed Siddiqi | Ibrahim Alrashdi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1862888
  • - Review Article

Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges

Naeem Ahmed | Rashid Amin | ... | Tariq Shah
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2109024
  • - Research Article

Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces

Mohib Ullah | Rafi Ullah Khan | ... | Muhammad Arshad Islam
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3186112
  • - Research Article

Blockchain-Based Proof of Retrievability Scheme

Yan Ren | Haipeng Guan | ... | Zongxiang Yi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6401316
  • - Research Article

Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM

Xiaoyao Liao | Changzhi Wang | Wen Chen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 8299232
  • - Research Article

Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism

Wenjuan Jia | Guanhao Xue | ... | Yupu Hu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 6338123
  • - Research Article

Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks

Jing Zhang | Si-Tong Shi | ... | Li Xu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6737942
  • - Research Article

A Blockchain-Assisted Electronic Medical Records by Using Proxy Reencryption and Multisignature

Xiaoguang Liu | Jun Yan | ... | Rongjun Wu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2578744
  • - Research Article

A Method of the Active and Passive Event Service Based on the Sensor Web

Lan Liu | Jingjing Fan | ... | Xuefeng Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 2051058
  • - Research Article

Reversible Data Hiding Based on Multiple Pairwise PEE and Two-Layer Embedding

Wenguang He | Gangqiang Xiong | Yaomin Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3306098
  • - Research Article

A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic

Yuchen Sun | Xiangyang Luo | ... | Zhaorui Ma
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.