Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household
(Articles)
Xiangdong Hu
,
Hongru Xu
,
Kaimin Han
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27001
3,352
Downloads
4,446
Views
Citations
Analysis of Recent Secure Scan Test Techniques
(Articles)
Cheng Xing
,
Sungju Park
,
Ji Zhao
Journal of Software Engineering and Applications
Vol.9 No.3
,March 31, 2016
DOI:
10.4236/jsea.2016.93008
3,197
Downloads
4,145
Views
Citations
Secure Operation and Optimal Generation Scheduling Considering Battery Life for an Isolated Northwest Grid of Saudi Arabia
(Articles)
Hani Albalawi
,
Karthikeyan Balasubramaniam
,
Elham Makram
Journal of Power and Energy Engineering
Vol.5 No.1
,January 17, 2017
DOI:
10.4236/jpee.2017.51004
1,399
Downloads
2,307
Views
Citations
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,795
Downloads
4,886
Views
Citations
Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric
(Articles)
Ragouguelaba Agoda Koussema
,
Hirohide Haga
Journal of Computer and Communications
Vol.9 No.9
,September 17, 2021
DOI:
10.4236/jcc.2021.99003
272
Downloads
1,597
Views
Citations
Hyperchaotic Impulsive Synchronization and Digital Secure Communication
(Articles)
Mingjun Wang
,
Yujun Niu
,
Bing Gao
,
Qijie Zou
Journal of Applied Mathematics and Physics
Vol.10 No.12
,December 5, 2022
DOI:
10.4236/jamp.2022.1012230
82
Downloads
286
Views
Citations
Blockchain-Based Certificate Authentication System with Enabling Correction
(Articles)
Md. Mijanur Rahman
,
Md. Tanzinul Kabir Tonmoy
,
Saifur Rahman Shihab
,
Riya Farhana
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113006
198
Downloads
2,081
Views
Citations
Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security
(Articles)
Md. Shamim Hossain
,
Md. Zahurul Islam Sarkar
Journal of Computer and Communications
Vol.11 No.8
,August 29, 2023
DOI:
10.4236/jcc.2023.118010
66
Downloads
286
Views
Citations
General Purpose Wireless Communication System Using Data Acquisition
(Articles)
Abdullah Eroglu
,
Bill Westrick
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41007
7,059
Downloads
11,575
Views
Citations
A Space Unrestricted Multi-Robot Combat Internet of Things System
(Articles)
Omar Said
,
Mehedi Masud
Advances in Internet of Things
Vol.2 No.3
,July 26, 2012
DOI:
10.4236/ait.2012.23007
7,248
Downloads
13,440
Views
Citations
Impact of a Radio Frequency Electronic Article Surveillance (EAS) System on Active Implants
(Articles)
Norbert Leitgeb
,
Florian Niedermayr
,
Christoph Fuchs
Journal of Electromagnetic Analysis and Applications
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/jemaa.2012.49049
5,500
Downloads
8,005
Views
Citations
Cost Analysis of Introducing a Log Identification System Using RFID in the Wood Supply Chain: A Case Study at a Swedish Forest Company
(Articles)
Daniel Timpe
,
Leif Olsson
,
Johan Sidén
American Journal of Industrial and Business Management
Vol.2 No.4
,October 31, 2012
DOI:
10.4236/ajibm.2012.24017
5,241
Downloads
8,462
Views
Citations
Dynamic 3-D Indoor Radio Propagation Model and Applications with Radios from 433 MHZ to 2.4 GHz
(Articles)
Yiming Ji
Int'l J. of Communications, Network and System Sciences
Vol.5 No.11
,November 26, 2012
DOI:
10.4236/ijcns.2012.511079
6,242
Downloads
9,054
Views
Citations
RFID Applications: Prospects and Challenges in Bangladesh
(Articles)
Abdul Kadar Muhammad Masum
,
Faruk Bhuiyan
,
Kazi Golam Azam
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42009
6,895
Downloads
10,712
Views
Citations
A Wireless Inductive-Capacitive Resonant Circuit Sensor Array for Force Monitoring
(Articles)
Andrew J. DeRouin
,
Brandon D. Pereles
,
Thadeus M. Sansom
,
Peng Zang
,
Keat Ghee Ong
Journal of Sensor Technology
Vol.3 No.3
,September 12, 2013
DOI:
10.4236/jst.2013.33011
5,450
Downloads
9,067
Views
Citations
A Single-Chip UHF RFID Reader Transceiver IC
(Articles)
Runxi Zhang
,
Chunqi Shi
,
Zongsheng Lai
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2101
5,255
Downloads
9,338
Views
Citations
Tri-Band Fractal Antennas for RFID Applications
(Articles)
Abdelati Reha
,
Ahmed Oulad Said
Wireless Engineering and Technology
Vol.4 No.4
,October 15, 2013
DOI:
10.4236/wet.2013.44025
7,763
Downloads
12,162
Views
Citations
Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol
(Articles)
Emad Felemban
Journal of Computer and Communications
Vol.2 No.1
,December 26, 2013
DOI:
10.4236/jcc.2014.21003
5,067
Downloads
7,868
Views
Citations
Recharging RFID Tags for Environmental Monitoring Using UAVs: A Feasibility Analysis
(Articles)
Marco Allegretti
,
Silvano Bertoldo
Wireless Sensor Network
Vol.7 No.2
,February 4, 2015
DOI:
10.4236/wsn.2015.72002
7,580
Downloads
8,821
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,035
Downloads
3,053
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top