Next Article in Journal
Varietal Characteristics of Jerusalem Artichoke as a High Nutritional Value Crop for Herbivorous Animal Husbandry
Previous Article in Journal
Editorial of the Special Issue “Statistics and Pattern Recognition Applied to the Spatio-Temporal Properties of Seismicity”
 
 
Article
Peer-Review Record

A Secure Communication Method Based on Message Hash Chain

Appl. Sci. 2022, 12(9), 4505; https://doi.org/10.3390/app12094505
by Mingxuan Han and Wenbao Jiang *
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Reviewer 3: Anonymous
Appl. Sci. 2022, 12(9), 4505; https://doi.org/10.3390/app12094505
Submission received: 22 March 2022 / Revised: 19 April 2022 / Accepted: 21 April 2022 / Published: 29 April 2022
(This article belongs to the Topic Cyber Security and Critical Infrastructures)

Round 1

Reviewer 1 Report

Reference number is missing on Page 7 line 226

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

Congratulations on the article!

To increase the quality of the article, I recommend:

  1. In the introductory paragraph, please present very clearly your contribution to the MHC - classical method.
  2. Please extend paragraph 8 of the article. Please provide more details about the experiment.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

Why Hash Chain and not any other paradigm was opted for the underlying purpose? Even if the authors are biased towards the Hash Chain (and which is perfectly fine), there is still a need to highlight other competing emerging technologies, e.g., Trust, to the least. I would, therefore, suggest the authors to make a small reference to such paradigms within the Introduction section. To begin with, the authors may read the following (or similar) literature:

  1. Trust on Wheels: Towards Secure and Resource Efficient IoV Networks. Computing, doi: 10.1007/s00607-021-01040-7. 
  2. When Trust Meets the Internet of Vehicles: Opportunities, Challenges, and Future Prospects. IEEE International Conference on Collaboration and Internet Computing, doi: 10.1109/CIC52973.2021.00018.
  3. A Trust Management Scheme to Secure Mobile Information Centric Networks. Computer Comm., doi: 10.1016/j.comcom.2019.12.024 

It is also important to segregate the Introduction and the State-of-the-Art in two different sections. Moreover, the Introduction needs to be extended to a considerable extent and Contributions of the manuscript-at-hand should be clearly delineated towards the end of the same in a serialized manner.

Section 2.1 (Notation and Meaning) should be transformed in a Table. Future Directions should be incorporated in the Conclusion section too.

A careful revisit of the Sentence Structure and Jargon is indispensable here.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 3 Report

Thank you for addressing the Comments.

Back to TopTop