Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Effect of Planting Methods on the Yield and Yield Attributes of Short Duration
Aman
Rice
(Articles)
Md. Masud Rana
,
Md. Abdullah Al Mamun
,
Afruz Zahan
,
Md. Nayeem Ahmed
,
Md. Abdul Jalil Mridha
American Journal of Plant Sciences
Vol.5 No.3
,January 26, 2014
DOI:
10.4236/ajps.2014.53033
6,138
Downloads
11,290
Views
Citations
Reference Encryption for Access Right Segregation and Domain Representation
(Articles)
Lanfranco Lopriore
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32010
3,448
Downloads
6,024
Views
Citations
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
(Articles)
Benamar Kadri
,
Djilalli Moussaoui
,
Mohammed Feham
,
Abdellah Mhammed
Wireless Sensor Network
Vol.4 No.6
,June 13, 2012
DOI:
10.4236/wsn.2012.46022
5,433
Downloads
10,877
Views
Citations
New Practical Algebraic Public-Key Cryptosystem and Some Related Algebraic and Computational Aspects
(Articles)
S. K. Rososhek
Applied Mathematics
Vol.4 No.7
,July 11, 2013
DOI:
10.4236/am.2013.47142
3,570
Downloads
5,282
Views
Citations
Simulation Based Prospective Productivity Assessment of Complex Services
(Articles)
Andreas Petz
,
Sönke Duckwitz
,
Susanne Mütze-Niewöhner
,
Christopher M. Schlick
iBusiness
Vol.5 No.3B
,November 8, 2013
DOI:
10.4236/ib.2013.53B008
3,919
Downloads
5,092
Views
Citations
Population, Development and Deforestation in Songea District, Tanzania
(Articles)
Michael J. Haule
Natural Resources
Vol.5 No.1
,January 26, 2014
DOI:
10.4236/nr.2014.51004
4,402
Downloads
6,795
Views
Citations
Complexity and Uncertainty regarding Superannuation Do Not Explain Key Decisions Taken by Members
(Articles)
Necmi K. Avkiran
,
Elizabeth Zhu
Theoretical Economics Letters
Vol.8 No.11
,August 2, 2018
DOI:
10.4236/tel.2018.811135
723
Downloads
1,564
Views
Citations
This article belongs to the Special Issue on
Social Economics
A Clustering Algorithm for Key Frame Extraction Based on Density Peak
(Articles)
Hong Zhao
,
Tao Wang
,
Xiangyan Zeng
Journal of Computer and Communications
Vol.6 No.12
,December 26, 2018
DOI:
10.4236/jcc.2018.612012
970
Downloads
2,446
Views
Citations
Progress in Analysis of Key Technologies for Dynamic Wireless Charging of Electric Vehicles
(Articles)
Wanqing Li
,
Kai Wang
,
Pinduan Hu
Energy and Power Engineering
Vol.11 No.5
,May 24, 2019
DOI:
10.4236/epe.2019.115012
1,224
Downloads
2,278
Views
Citations
The Significant and Profound Impacts of Chou’s Distorted Key Theory for Developing Peptide Drugs
(Articles)
Kuo-Chen Chou
Natural Science
Vol.12 No.9
,September 10, 2020
DOI:
10.4236/ns.2020.129049
233
Downloads
673
Views
Citations
The Integration of Mainstream Psychotherapies in an Epistemological Framework
(Articles)
Zhizhong Kai
Open Journal of Social Sciences
Vol.9 No.1
,January 15, 2021
DOI:
10.4236/jss.2021.91005
521
Downloads
1,461
Views
Citations
A Complex Encryption System Design Implemented by AES
(Articles)
Zhimao Lu
,
Houmed Mohamed
Journal of Information Security
Vol.12 No.2
,April 30, 2021
DOI:
10.4236/jis.2021.122009
570
Downloads
3,754
Views
Citations
New Progress in CPK Public Key
(Articles)
Xianghao Nan
Open Access Library Journal
Vol.8 No.8
,August 19, 2021
DOI:
10.4236/oalib.1107440
61
Downloads
530
Views
Citations
Analysis and Countermeasure Research on the Development Status of Guangdong Culture Tourism Industry
(Articles)
Guang Yang
Open Journal of Social Sciences
Vol.11 No.2
,February 10, 2023
DOI:
10.4236/jss.2023.112006
96
Downloads
564
Views
Citations
Description of Four New Species for the Genus Damasippus Stål, 1875 (Phasmida: Prisopodidae)
(Articles)
Marcela Sánchez-Ocampo
,
Diego Monge-Villegas
Advances in Entomology
Vol.11 No.2
,April 28, 2023
DOI:
10.4236/ae.2023.112009
87
Downloads
362
Views
Citations
Optimizing Business Performance through KPI Alignment: A Comprehensive Analysis of Key Performance Indicators and Strategic Objectives
(Articles)
Thea Thomas Mtau
,
Nelsen A. Rahul
American Journal of Industrial and Business Management
Vol.14 No.1
,January 31, 2024
DOI:
10.4236/ajibm.2024.141003
140
Downloads
790
Views
Citations
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
(Articles)
Hossein Fereidooni
,
Hassan Taheri
,
Mehran Mahramian
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54030
6,835
Downloads
11,252
Views
Citations
How a Key Currency Functions as an International Liquidity Provision and Insurance System
(Articles)
Masayuki Otaki
Theoretical Economics Letters
Vol.3 No.1
,February 26, 2013
DOI:
10.4236/tel.2013.31007
4,515
Downloads
7,496
Views
Citations
Timing Attack Analysis on AA
β
Cryptosystem
(Articles)
A. H. A. Ghafar
,
M. R. K. Ariffin
Journal of Computer and Communications
Vol.2 No.4
,March 17, 2014
DOI:
10.4236/jcc.2014.24001
3,503
Downloads
5,109
Views
Citations
Cryptographic Protocols Based on Nielsen Transformations
(Articles)
Benjamin Fine
,
Anja I. S. Moldenhauer
,
Gerhard Rosenberger
Journal of Computer and Communications
Vol.4 No.12
,October 31, 2016
DOI:
10.4236/jcc.2016.412004
1,533
Downloads
2,426
Views
Citations
This article belongs to the Special Issue on
Coding and Cryptography
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top