Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
126
Downloads
878
Views
Citations
Numeric Identifier Transmission Algorithm Using Hash Function
(Articles)
Vladyslav Kutsman
Open Journal of Applied Sciences
Vol.13 No.9
,September 26, 2023
DOI:
10.4236/ojapps.2023.139125
58
Downloads
256
Views
Citations
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Okalas-Ossami Dieudonné
Journal of Information Security
Vol.15 No.1
,January 31, 2024
DOI:
10.4236/jis.2024.151005
68
Downloads
260
Views
Citations
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.3
,March 29, 2024
DOI:
10.4236/jcc.2024.123016
63
Downloads
333
Views
Citations
Sensitive Information Security Based on Elliptic Curves
(Articles)
Nadine Nibigira
,
Vincent Havyarimana
,
Zhu Xiao
World Journal of Engineering and Technology
Vol.12 No.2
,April 23, 2024
DOI:
10.4236/wjet.2024.122018
38
Downloads
128
Views
Citations
Hybrid ameloblastoma in a nigerian: Report of a case and review of literature
(Review)
O. A. Effiom
,
O. James
,
O. T. Akeju
,
A. S. Salami
,
O. Odukoya
Open Journal of Stomatology
Vol.3 No.7
,October 18, 2013
DOI:
10.4236/ojst.2013.37059
4,169
Downloads
6,071
Views
Citations
Hybrid Swarm Algorithm for Multiobjective Optimal Power Flow Problem
(Articles)
K. Rajalashmi
,
S. U. Prabha
Circuits and Systems
Vol.7 No.11
,September 8, 2016
DOI:
10.4236/cs.2016.711304
1,944
Downloads
3,291
Views
Citations
Finite Element Wear Behavior Modeling of Al/Al
2
SiO
5
/C Chilled Hybrid Metal Matrix Composites (CHMMCs)
(Articles)
Joel Hemanth
Materials Sciences and Applications
Vol.2 No.7
,July 29, 2011
DOI:
10.4236/msa.2011.27118
6,692
Downloads
11,431
Views
Citations
Evaluation of In-Use Fuel Economy for Hybrid and Regular Transit Buses
(Articles)
Shauna L. Hallmark
,
Bo Wang
,
Yu Qiu
,
Robert Sperry
Journal of Transportation Technologies
Vol.3 No.1
,January 25, 2013
DOI:
10.4236/jtts.2013.31006
6,499
Downloads
10,373
Views
Citations
Facile Method for the Synthesis of Copper Nanoparticles Supported on the Organoclay Material
(Articles)
Mokae Fanuel Bambo
,
Rui Werner Marcedo Krause
,
Richard Motlhaletsi Moutloali
Journal of Biomaterials and Nanobiotechnology
Vol.8 No.2
,April 28, 2017
DOI:
10.4236/jbnb.2017.82010
2,420
Downloads
6,080
Views
Citations
Global Convergence Property with Inexact Line Search for a New Hybrid Conjugate Gradient Method
(Articles)
Fanar N. Al-Namat
,
Ghada M. Al-Naemi
Open Access Library Journal
Vol.7 No.2
,February 11, 2020
DOI:
10.4236/oalib.1106048
439
Downloads
1,207
Views
Citations
Hybrid Repair of Two Consecutive Acute Ventricular Septal Ruptures after Evolving Myocardial Infarction: Case Report
(Articles)
Adel Mohammad Makhdoom
,
Ahmed Abdelrahman Elassal
World Journal of Cardiovascular Surgery
Vol.11 No.4
,April 29, 2021
DOI:
10.4236/wjcs.2021.114006
404
Downloads
1,101
Views
Citations
True Random Bit Generator Using ZCDPLL Based on TMS320C6416
(Articles)
Qassim NASIR
Int'l J. of Communications, Network and System Sciences
Vol.2 No.4
,July 16, 2009
DOI:
10.4236/ijcns.2009.24028
5,798
Downloads
11,054
Views
Citations
Improvement of Chen-Zhang-Liu’s IRPB Signature Scheme
(Articles)
Dezhi Gao
Intelligent Information Management
Vol.2 No.9
,October 13, 2010
DOI:
10.4236/iim.2010.29064
6,751
Downloads
9,892
Views
Citations
Algorithms for Integer Factorization Based on Counting Solutions of Various Modular Equations
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,November 24, 2011
DOI:
10.4236/ijcns.2011.411083
4,008
Downloads
7,295
Views
Citations
A Novel Pseudo Random Number Generator Based on Two Plasmonic Maps
(Articles)
Michael François
,
Thomas Grosges
,
Dominique Barchiesi
,
Robert Erra
Applied Mathematics
Vol.3 No.11
,November 20, 2012
DOI:
10.4236/am.2012.311230
4,449
Downloads
7,043
Views
Citations
Accelerated Series for Riemann Zeta Function at Odd Integer Arguments
(Articles)
Juuso T. Olkkonen
,
Hannu Olkkonen
Open Journal of Discrete Mathematics
Vol.3 No.1
,January 29, 2013
DOI:
10.4236/ojdm.2013.31004
4,830
Downloads
7,560
Views
Citations
Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks
(Articles)
Pino Caballero-Gil
,
Francisco Martín-Fernández
,
Cándido Caballero-Gil
Journal of Computer and Communications
Vol.2 No.9
,July 11, 2014
DOI:
10.4236/jcc.2014.29003
3,690
Downloads
4,516
Views
Citations
Cryptocurrencies: Are Disruptive Financial Innovations Here?
(Articles)
Gautam Vora
Modern Economy
Vol.6 No.7
,July 20, 2015
DOI:
10.4236/me.2015.67077
6,476
Downloads
11,504
Views
Citations
This article belongs to the Special Issue on
Financial Instruments
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,939
Downloads
4,880
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top