Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
4,933
Downloads
7,235
Views
Citations
Identity and Mobility in a Digital World
(Articles)
Ali M. Al-Khouri
Technology and Investment
Vol.4 No.1
,February 26, 2013
DOI:
10.4236/ti.2013.41002
5,845
Downloads
8,650
Views
Citations
On the Usage of the Faraday Effect as an Authentication Technique for Vegetable Oils
(Articles)
M. I. Abu-Taha
,
M. A. Halasa
,
M. M. Abu-Samreh
Journal of Modern Physics
Vol.4 No.2
,February 27, 2013
DOI:
10.4236/jmp.2013.42032
5,190
Downloads
7,453
Views
Citations
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks
(Articles)
Vivaksha Jariwala
,
Vishal Singh
,
Prafulla Kumar
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 10, 2014
DOI:
10.4236/jis.2014.51001
3,715
Downloads
6,595
Views
Citations
RFID Anti-Counterfeiting for Retailing Systems
(Articles)
Duy-Thinh Tran
,
Sung Je Hong
Journal of Applied Mathematics and Physics
Vol.3 No.1
,January 28, 2015
DOI:
10.4236/jamp.2015.31001
3,960
Downloads
5,392
Views
Citations
Identity Verification of Individuals Based on Retinal Features Using Gabor Filters and SVM
(Articles)
Mohamed A. El-Sayed
,
M. Hassaballah
,
Mohammed A. Abdel-Latif
Journal of Signal and Information Processing
Vol.7 No.1
,February 29, 2016
DOI:
10.4236/jsip.2016.71007
3,573
Downloads
5,019
Views
Citations
Face Recognition across Time Lapse Using Convolutional Neural Networks
(Articles)
Hachim El Khiyari
,
Harry Wechsler
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73010
5,803
Downloads
9,424
Views
Citations
Feasibility Study for Applying Spectral Imaging for Wheat Grain Authenticity Testing in Pasta
(Articles)
Timothy Wilkes
,
Gavin Nixon
,
Claire Bushell
,
Adrian Waltho
,
Amer Alroichdi
,
Malcolm Burns
Food and Nutrition Sciences
Vol.7 No.5
,April 28, 2016
DOI:
10.4236/fns.2016.75037
2,221
Downloads
4,010
Views
Citations
This article belongs to the Special Issue on
Food Analysis
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,594
Downloads
2,391
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,956
Downloads
4,669
Views
Citations
Accurate Fingerprint Enhancement and Identification Using Minutiae Extraction
(Articles)
Kumar Attangudi Perichiappan Perichappan
,
Sreenivas Sasubilli
Journal of Computer and Communications
Vol.5 No.14
,December 14, 2017
DOI:
10.4236/jcc.2017.514003
1,561
Downloads
4,991
Views
Citations
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations
(Articles)
Ezer Osei Yeboah-Boateng
,
Grace Dzifa Kwabena-Adade
Journal of Information Security
Vol.11 No.3
,July 17, 2020
DOI:
10.4236/jis.2020.113011
1,241
Downloads
2,835
Views
Citations
Modified Vanstone’s Construction of lightweight MAC for Vehicular On-Board IT Systems
(Articles)
István Vajda
Journal of Computer and Communications
Vol.8 No.12
,December 30, 2020
DOI:
10.4236/jcc.2020.812019
260
Downloads
700
Views
Citations
Use of AI Voice Authentication Technology Instead of Traditional Keypads in Security Devices
(Articles)
Deepak Ramesh Chandran
Journal of Computer and Communications
Vol.10 No.6
,June 13, 2022
DOI:
10.4236/jcc.2022.106002
266
Downloads
2,112
Views
Citations
Preventing Phishing Attack on Voting System Using Visual Cryptography
(Articles)
Ahood Alotaibi
,
Lama Alhubaidi
,
Alghala Alyami
,
Leena Marghalani
,
Bashayer Alharbi
,
Naya Nagy
Journal of Computer and Communications
Vol.10 No.10
,October 31, 2022
DOI:
10.4236/jcc.2022.1010010
172
Downloads
2,141
Views
Citations
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
(Articles)
Sampath Talluri
Journal of Information Security
Vol.15 No.1
,December 25, 2023
DOI:
10.4236/jis.2024.151001
77
Downloads
332
Views
Citations
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
(Articles)
Sampath Talluri
Journal of Information Security
Vol.15 No.1
,January 22, 2024
DOI:
10.4236/jis.2024.151004
67
Downloads
230
Views
Citations
E-Governance for Improved Public Service Delivery in Fiji
(Articles)
Rafia NAZ
Journal of Service Science and Management
Vol.2 No.3
,September 10, 2009
DOI:
10.4236/jssm.2009.23023
9,790
Downloads
20,177
Views
Citations
Applications of Norm and Situation Calculus in the Semantic Web Service Composition
(Articles)
Jun Zhao
,
Xiaozhu Gu
Journal of Software Engineering and Applications
Vol.3 No.8
,August 26, 2010
DOI:
10.4236/jsea.2010.38090
6,071
Downloads
9,475
Views
Citations
Architecture of Dynamic Service Composition Using Logic Petri Nets
(Articles)
Xia Jiang
,
Bing Wu
,
Yuyue Du
Journal of Software Engineering and Applications
Vol.4 No.10
,October 11, 2011
DOI:
10.4236/jsea.2011.410068
4,108
Downloads
7,446
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top