Security and Communication Networks
Security and Communication Networks
ISSNs: 1939-0114
Additional searchable ISSN (electronic): 1939-0122
John Wiley and Sons Inc., United States
Scopus rating (2022): CiteScore 2.6 SJR 0.494 SNIP 0.781
Journal
Research Output
- 2018
- Published
Kuijia: Traffic Rescaling in Software-Defined Data Center WANs
Zhang, C., Xu, H., Liu, L., Niu, Z. & Wang, P., 2018, In: Security and Communication Networks. 2018, 6361901.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 4 - 2016
- Published
Secure the Internet, one home at a time
Xu, K., Wang, F. & Jia, X., 10 Nov 2016, In: Security and Communication Networks. 9, 16, p. 3821-3832Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 18 - Published
Security and privacy in Internet of things: methods, architectures, and solutions
Han, G., Shu, L., Chan, S. & Hu, J., Oct 2016, In: Security and Communication Networks. 9, 15, p. 2641-2642Research output: Journal Publications and Reviews › Editorial Preface
Scopus citations: 12 - Published
One-move convertible nominative signature in the standard model
Liu, D. Y. W. & Wong, D. S., Aug 2016, In: Security and Communication Networks. 9, 12, p. 1796-1809Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 1 - Published
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization
Zhang, Y., Xiao, D., Wong, K.-W., Zhou, J., Bai, S. & Su, M., 2016, In: Security and Communication Networks. 9, 1, p. 43-53Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 4 - 2015
- Published
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection
Meng, W., Li, W. & Kwok, L.-F., Dec 2015, In: Security and Communication Networks. 8, 18, p. 3883-3895Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 72 - Published
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction
Yang, A., Liang, K., Zhuang, Y., Wong, D. S. & Jia, X., 10 Nov 2015, In: Security and Communication Networks. 8, 16, p. 2836-2849Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 3 - Published
Fair two-party computation with rational parties holding private types
Wang, Y., Wong, D. S., Zhao, C. & Xu, Q., 25 Jan 2015, In: Security and Communication Networks. 8, 2, p. 284-297Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 10 - 2014
- Published
A practical anonymous authentication protocol for wireless roaming
Xie, Q., Tan, X., Wong, D. S., Wang, G., Bao, M. & Dong, N., Aug 2014, In: Security and Communication Networks. 7, 8, p. 1264-1273Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 6 A data mining system for distributed abnormal event detection in backbone networks
Zhou, Y., Hu, G. & Wu, D., May 2014, In: Security and Communication Networks. 7, 5, p. 904-913Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 7- 2012
- Published
Secure and efficient dynamic program update in wireless sensor networks
He, D., Chan, S., Chen, C. & Bu, J., Jul 2012, In: Security and Communication Networks. 5, 7, p. 823-830Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 4 Content-based image authentication by feature point clustering and matching
Yang, L., Tian, J. & Wu, D., Jun 2012, In: Security and Communication Networks. 5, 6, p. 636-647Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 2Leakage-probability-constrained secrecy capacity of a fading channel
Chen, Z., Wu, D., Fan, P. & Letaief, K. B., Jun 2012, In: Security and Communication Networks. 5, 6, p. 583-593Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Robust track-and-trace video watermarking
Yang, L., Chen, Q., Tian, J. & Wu, D., Apr 2012, In: Security and Communication Networks. 5, 4, p. 353-363Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 2Pitch-based gender identification with two-stage classification
Hu, Y., Wu, D. & Nucci, A., Feb 2012, In: Security and Communication Networks. 5, 2, p. 211-225Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 50- 2011
A robust video hash scheme based on 2D-DCT temporal maximum occurrence
Chen, Q., Tian, J., Yang, L. & Wu, D., Dec 2011, In: Security and Communication Networks. 4, 12, p. 1369-1377Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 6Content based image hashing using companding and gray code
Yang, L., Chen, Q., Tian, J. & Wu, D., Dec 2011, In: Security and Communication Networks. 4, 12, p. 1378-1386Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 6Protocol oblivious classification of multimedia traffic
Fan, J., Wu, D., Nucci, A., Keralapura, R. & Gao, L., Apr 2011, In: Security and Communication Networks. 4, 4, p. 357-371Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 3