Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Blockchain-Based Certificate Authentication System with Enabling Correction
(Articles)
Md. Mijanur Rahman
,
Md. Tanzinul Kabir Tonmoy
,
Saifur Rahman Shihab
,
Riya Farhana
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113006
198
Downloads
2,083
Views
Citations
Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security
(Articles)
Md. Shamim Hossain
,
Md. Zahurul Islam Sarkar
Journal of Computer and Communications
Vol.11 No.8
,August 29, 2023
DOI:
10.4236/jcc.2023.118010
66
Downloads
288
Views
Citations
Enhancement of Multicast Security with Opportunistic Relaying Technique over
κ
-
μ
Shadowed Fading Channels
(Articles)
Ashik Alam
,
Md. Zahurul Islam Sarkar
Journal of Computer and Communications
Vol.10 No.11
,November 30, 2022
DOI:
10.4236/jcc.2022.1011009
80
Downloads
329
Views
Citations
Secure Path Cycle Selection Method Using Fuzzy Logic System for Improving Energy Efficiency in Statistical En-Route Filtering Based WSNs
(Articles)
Su Man Nam
,
Chung Il Sun
,
Tae Ho Cho
Wireless Sensor Network
Vol.3 No.11
,October 31, 2011
DOI:
10.4236/wsn.2011.311041
4,687
Downloads
7,808
Views
Citations
Secure Implementation in Queueing Problems
(Articles)
Katsuhiko Nishizaki
Theoretical Economics Letters
Vol.2 No.5
,December 28, 2012
DOI:
10.4236/tel.2012.25103
3,650
Downloads
5,759
Views
Citations
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks
(Articles)
Vivaksha Jariwala
,
Vishal Singh
,
Prafulla Kumar
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 10, 2014
DOI:
10.4236/jis.2014.51001
3,715
Downloads
6,590
Views
Citations
Online Stability Assessment in Control Room Environment
(Articles)
R. Krebs
,
C. Heyde
,
X.-P. Liang
Journal of Power and Energy Engineering
Vol.2 No.4
,April 21, 2014
DOI:
10.4236/jpee.2014.24049
5,168
Downloads
6,161
Views
Citations
Three-Party Simultaneous Quantum Secure Communication Based on Closed Transmission Loops
(Articles)
Xunru Yin
Journal of Quantum Information Science
Vol.4 No.4
,December 31, 2014
DOI:
10.4236/jqis.2014.44024
4,685
Downloads
5,444
Views
Citations
RFID Anti-Counterfeiting for Retailing Systems
(Articles)
Duy-Thinh Tran
,
Sung Je Hong
Journal of Applied Mathematics and Physics
Vol.3 No.1
,January 28, 2015
DOI:
10.4236/jamp.2015.31001
3,956
Downloads
5,377
Views
Citations
The Impact of Personal Psychology and Behavior Factors on the Innovation Assimilation of Secure System Development
(Articles)
Songming Qiu
,
Penghua Wang
,
Peng Yang
American Journal of Industrial and Business Management
Vol.5 No.4
,April 20, 2015
DOI:
10.4236/ajibm.2015.54020
2,937
Downloads
3,894
Views
Citations
Modified Vanstone’s Construction of lightweight MAC for Vehicular On-Board IT Systems
(Articles)
István Vajda
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812019
256
Downloads
692
Views
Citations
Secure Wireless Multicasting through Nakagami-
m
Fading Channels with Multi-Hop Relaying
(Articles)
Md. Mizanur Rahman
,
Md. Zahurul Islam Sarkar
,
Mohammad Mahmud Hasan
Journal of Computer and Communications
Vol.11 No.5
,May 31, 2023
DOI:
10.4236/jcc.2023.115013
94
Downloads
374
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,245
Downloads
7,613
Views
Citations
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61001
4,180
Downloads
6,047
Views
Citations
Security in Multicast Over
α
-
μ
Fading Channels with Orthogonal Frequency Division Multiplexing
(Articles)
Mohammad Mahmud Hasan
,
Md. Zahurul Islam Sarkar
Journal of Computer and Communications
Vol.10 No.11
,November 17, 2022
DOI:
10.4236/jcc.2022.1011006
91
Downloads
442
Views
Citations
Forensics: Collection of Sound Digital Evidence
(Articles)
Richard Kabanda
,
Harihar Thapa
,
Luis Rivera
Journal of Information Security
Vol.14 No.4
,October 25, 2023
DOI:
10.4236/jis.2023.144025
167
Downloads
851
Views
Citations
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.4
,April 15, 2011
DOI:
10.4236/ijcns.2011.44024
5,621
Downloads
9,762
Views
Citations
Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45033
3,854
Downloads
7,189
Views
Citations
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment
(Articles)
Amir Mohamed Talib
Journal of Information Security
Vol.6 No.2
,April 16, 2015
DOI:
10.4236/jis.2015.62013
5,926
Downloads
7,179
Views
Citations
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN
(Articles)
Mohanbabu Gopalakrishnan
,
Gopi Saminathan Arumugam
,
Karthigai Lakshmi
,
Shanmuga Vel
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78123
1,690
Downloads
3,106
Views
Citations
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top