Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household
(Articles)
Xiangdong Hu
,
Hongru Xu
,
Kaimin Han
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27001
3,349
Downloads
4,505
Views
Citations
Analysis of Recent Secure Scan Test Techniques
(Articles)
Cheng Xing
,
Sungju Park
,
Ji Zhao
Journal of Software Engineering and Applications
Vol.9 No.3
,March 31, 2016
DOI:
10.4236/jsea.2016.93008
3,186
Downloads
4,256
Views
Citations
Secure Operation and Optimal Generation Scheduling Considering Battery Life for an Isolated Northwest Grid of Saudi Arabia
(Articles)
Hani Albalawi
,
Karthikeyan Balasubramaniam
,
Elham Makram
Journal of Power and Energy Engineering
Vol.5 No.1
,January 17, 2017
DOI:
10.4236/jpee.2017.51004
1,394
Downloads
2,388
Views
Citations
Towards the Development of Best Data Security for Big Data
(Articles)
Yuan Tian
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94020
1,784
Downloads
5,124
Views
Citations
Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric
(Articles)
Ragouguelaba Agoda Koussema
,
Hirohide Haga
Journal of Computer and Communications
Vol.9 No.9
,September 17, 2021
DOI:
10.4236/jcc.2021.99003
267
Downloads
1,651
Views
Citations
Hyperchaotic Impulsive Synchronization and Digital Secure Communication
(Articles)
Mingjun Wang
,
Yujun Niu
,
Bing Gao
,
Qijie Zou
Journal of Applied Mathematics and Physics
Vol.10 No.12
,December 5, 2022
DOI:
10.4236/jamp.2022.1012230
80
Downloads
316
Views
Citations
Blockchain-Based Certificate Authentication System with Enabling Correction
(Articles)
Md. Mijanur Rahman
,
Md. Tanzinul Kabir Tonmoy
,
Saifur Rahman Shihab
,
Riya Farhana
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113006
193
Downloads
2,131
Views
Citations
Opportunistic Relaying Technique over Rayleigh Fading Channel to Improve Multicast Security
(Articles)
Md. Shamim Hossain
,
Md. Zahurul Islam Sarkar
Journal of Computer and Communications
Vol.11 No.8
,August 29, 2023
DOI:
10.4236/jcc.2023.118010
60
Downloads
299
Views
Citations
General Purpose Wireless Communication System Using Data Acquisition
(Articles)
Abdullah Eroglu
,
Bill Westrick
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41007
7,049
Downloads
11,682
Views
Citations
A Space Unrestricted Multi-Robot Combat Internet of Things System
(Articles)
Omar Said
,
Mehedi Masud
Advances in Internet of Things
Vol.2 No.3
,July 26, 2012
DOI:
10.4236/ait.2012.23007
7,246
Downloads
13,535
Views
Citations
Impact of a Radio Frequency Electronic Article Surveillance (EAS) System on Active Implants
(Articles)
Norbert Leitgeb
,
Florian Niedermayr
,
Christoph Fuchs
Journal of Electromagnetic Analysis and Applications
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/jemaa.2012.49049
5,488
Downloads
8,124
Views
Citations
Cost Analysis of Introducing a Log Identification System Using RFID in the Wood Supply Chain: A Case Study at a Swedish Forest Company
(Articles)
Daniel Timpe
,
Leif Olsson
,
Johan Sidén
American Journal of Industrial and Business Management
Vol.2 No.4
,October 31, 2012
DOI:
10.4236/ajibm.2012.24017
5,236
Downloads
8,601
Views
Citations
Dynamic 3-D Indoor Radio Propagation Model and Applications with Radios from 433 MHZ to 2.4 GHz
(Articles)
Yiming Ji
Int'l J. of Communications, Network and System Sciences
Vol.5 No.11
,November 26, 2012
DOI:
10.4236/ijcns.2012.511079
6,236
Downloads
9,219
Views
Citations
RFID Applications: Prospects and Challenges in Bangladesh
(Articles)
Abdul Kadar Muhammad Masum
,
Faruk Bhuiyan
,
Kazi Golam Azam
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42009
6,869
Downloads
11,565
Views
Citations
A Wireless Inductive-Capacitive Resonant Circuit Sensor Array for Force Monitoring
(Articles)
Andrew J. DeRouin
,
Brandon D. Pereles
,
Thadeus M. Sansom
,
Peng Zang
,
Keat Ghee Ong
Journal of Sensor Technology
Vol.3 No.3
,September 12, 2013
DOI:
10.4236/jst.2013.33011
5,437
Downloads
9,242
Views
Citations
A Single-Chip UHF RFID Reader Transceiver IC
(Articles)
Runxi Zhang
,
Chunqi Shi
,
Zongsheng Lai
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2101
5,246
Downloads
9,625
Views
Citations
Tri-Band Fractal Antennas for RFID Applications
(Articles)
Abdelati Reha
,
Ahmed Oulad Said
Wireless Engineering and Technology
Vol.4 No.4
,October 15, 2013
DOI:
10.4236/wet.2013.44025
7,752
Downloads
12,637
Views
Citations
Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol
(Articles)
Emad Felemban
Journal of Computer and Communications
Vol.2 No.1
,December 26, 2013
DOI:
10.4236/jcc.2014.21003
5,060
Downloads
8,232
Views
Citations
Recharging RFID Tags for Environmental Monitoring Using UAVs: A Feasibility Analysis
(Articles)
Marco Allegretti
,
Silvano Bertoldo
Wireless Sensor Network
Vol.7 No.2
,February 4, 2015
DOI:
10.4236/wsn.2015.72002
7,576
Downloads
8,855
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,029
Downloads
3,159
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top