Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Nonlinear Filter Boolean Function of LILI-128 Stream Cipher Generator Is Successfully Broken Based on the Complexity of Nonlinear 0 1 Symbol Sequence
(Articles)
Xiangao Huang
,
Chao Wang
,
Wei Huang
,
Junxian Li
Circuits and Systems
Vol.4 No.2
,April 17, 2013
DOI:
10.4236/cs.2013.42022
4,988
Downloads
7,220
Views
Citations
Caudal and Penile Blocks Demonstrate Similar Reliability and Efficacy in Pediatric Patients Undergoing Circumcision: A Meta-Analysis
(Articles)
Kiran Malik
,
Ronald S. Chamberlain
International Journal of Clinical Medicine
Vol.7 No.5
,May 26, 2016
DOI:
10.4236/ijcm.2016.75033
2,030
Downloads
3,472
Views
Citations
This article belongs to the Special Issue on
Anesthesia & Perioperative Care
Image Encryption Algorithm Based on a Chaotic Iterative Process
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.12
,December 17, 2012
DOI:
10.4236/am.2012.312262
5,894
Downloads
9,330
Views
Citations
Image Encryption Scheme Based on Filter Bank and Lifting
(Articles)
Saleh Saraireh
,
Yazeed Al-Sbou
,
Ja’afer Al-Saraireh
,
Othman Alsmadi
Int'l J. of Communications, Network and System Sciences
Vol.7 No.1
,January 24, 2014
DOI:
10.4236/ijcns.2014.71006
4,323
Downloads
6,544
Views
Citations
An Image Encryption Method Based on Quantum Fourier Transformation
(Articles)
Ying Liu
,
Bing Zhou
,
Zijing Li
,
Jiangnan Deng
,
Zhengying Cai
International Journal of Intelligence Science
Vol.8 No.3
,July 30, 2018
DOI:
10.4236/ijis.2018.83004
914
Downloads
1,817
Views
Citations
Mapping Glacier Variations at Regional Scale through Equilibrium Line Altitude Interpolation: GIS andStatistical Application in Massif des Écrins (French Alps)
(Articles)
Étienne Cossart
Journal of Geographic Information System
Vol.3 No.3
,July 29, 2011
DOI:
10.4236/jgis.2011.33020
3,995
Downloads
7,835
Views
Citations
Fore-Body Side Vortex of KVLCC2 at 30° Drift: A Trailing Vortex Resolved with DES and Compared to PIV Data
(Articles)
Dag-Frederik Feder
,
Ivan Shevchuk
,
Ahmed Sahab
,
Lukas Gerwers
,
Moustafa Abdel-Maksoud
Open Journal of Fluid Dynamics
Vol.9 No.4
,October 30, 2019
DOI:
10.4236/ojfd.2019.94020
541
Downloads
1,490
Views
Citations
Demand and Capacity Modelling in Healthcare Using Discrete Event Simulation
(Articles)
Saurav Singla
Open Journal of Modelling and Simulation
Vol.8 No.4
,September 16, 2020
DOI:
10.4236/ojmsi.2020.84007
928
Downloads
3,047
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
1,230
Downloads
3,885
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
CPK Public Key and Its Basic Functions
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.9 No.1
,January 14, 2022
DOI:
10.4236/oalib.1108287
54
Downloads
735
Views
Citations
Pseudo DNA Sequence Generation of Non-Coding Distributions Using Variant Maps on Cellular Automata
(Articles)
Jeffrey Zheng
,
Jin Luo
,
Wei Zhou
Applied Mathematics
Vol.5 No.1
,January 14, 2014
DOI:
10.4236/am.2014.51018
3,906
Downloads
5,653
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,505
Downloads
2,578
Views
Citations
Security Implementation in WSN with Symmetric and Matrix Mapping on Asymmetric ECC Cryptographic Techniques
(Articles)
S. Hemalatha
,
V. Rajamani
,
V. Parthasarathy
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710273
2,052
Downloads
3,230
Views
Citations
Tachycardia Following Ganglion Impar Block
(Articles)
E. Ngugi Kinyungu
,
Troy Buck
,
Joseph R. Holtman
Open Journal of Anesthesiology
Vol.2 No.5
,November 28, 2012
DOI:
10.4236/ojanes.2012.25049
4,096
Downloads
6,117
Views
Citations
Off Label Use of Exparel in an Axillary Block for Prolonged Postoperative Analgesia
(Articles)
Reet Lawhon
,
Robert LaCivita
,
John Fanouse
,
Dennis Feierman
Open Journal of Anesthesiology
Vol.5 No.7
,July 22, 2015
DOI:
10.4236/ojanes.2015.57030
4,665
Downloads
5,806
Views
Citations
Acquired Complete Heart Block with Long QT Interval and Recurrent Polymorphic Ventricular Tachycardia: A Case Report
(Articles)
Hosam Zaky
,
Jassem Al Hashmi
Open Journal of Internal Medicine
Vol.6 No.2
,June 16, 2016
DOI:
10.4236/ojim.2016.62008
2,466
Downloads
4,650
Views
Citations
Contribution to the Characterization Study of the Surface Indices of the Lotshi Block and Its Surroundings in the Coastal Basin of Congo
(Articles)
Bruno Deko Oyema
,
Dominique Wetshondo Osomba
,
Bavon Diemu Tshiband
,
Patrick Lokata Ediho
,
Jean-Piére Kalay Kut
,
Jean Ondontshia Nkoyi
,
Link Bukasa Muamba
,
Joël Kabesa Kilungu
Open Journal of Yangtze Oil and Gas
Vol.7 No.1
,January 30, 2022
DOI:
10.4236/ojogas.2022.71006
152
Downloads
821
Views
Citations
Image Encryption Based on the General Approach for Multiple Chaotic Systems
(Articles)
Qais H. Alsafasfeh
,
Aouda A. Arfoa
Journal of Signal and Information Processing
Vol.2 No.3
,September 27, 2011
DOI:
10.4236/jsip.2011.23033
6,016
Downloads
11,865
Views
Citations
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
(Articles)
Abdulrahman H. Altalhi
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41011
5,177
Downloads
8,832
Views
Citations
Privacy Preserving Scheme for Location-Based Services
(Articles)
Youssef Gahi
,
Mouhcine Guennoun
,
Zouhair Guennoun
,
Khalil El-Khatib
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32013
6,040
Downloads
11,897
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top