Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
More Web Proxy on the site http://driver.im/
Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-11-25
Vol. 19, No. 11 has been published online!
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
Home
>
Published Issues
>
2020
>
Volume 15, No. 10, October 2020
>
Volume 15, No. 10, October 2020
Article#
Article Title & Authors (Volume 15, No. 10, October 2020)
Page
1
Experimental Study of Component-Differentially-Challenged XOR PUFs as Security Primitives for Internet-of-Things
Khalid T. Mursi and Yu Zhuang
714
2
The Impacts of DNS Protocol Security Weaknesses
Willian A. Dimitrov and Galina S. Panayotova
722
3
A Triple-Band Antenna Loaded with Reflector Surface for WLAN and 5G Applications
Tengfei Hu, Zhenni Pan, Megumi Saitou, Jiang Liu, and Shigeru Shimamoto
729
4
Implementing IoT Lottery on Data Encryption Standard
Mohammed M. Alani, Muath Alrammal, and Munir Naveed
735
5
A Methodology to Select Topology Generators for Ad Hoc Mesh Network Simulations
Michael O’Sullivan, Leonardo Aniello, and Vladimiro Sassone
741
6
A New Method for Designing Post-Quantum Signature Schemes
Minh Nguyen Hieu, Moldovyan Alexander Andreevich, Moldovyan Nikolay Andreevich, and Canh Hoang Ngoc
747
7
Integrating Smartphone Network Architecture and Data Security Techniques to Mitigate Sharp Practices in Non-Profit Organizations
Matimu Caswell Nkuna, Ebenezer Esenogho, and Reolyn Heymann
755
8
Transmission Power Based Intelligent Model in VANET
Pushpender Sarao
768