Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,609
Downloads
7,258
Views
Citations
Consumption Profile of the Socially Excluded People
(Articles)
Maniklal Adhikary
,
Khokon Sarkar
Modern Economy
Vol.3 No.6
,October 31, 2012
DOI:
10.4236/me.2012.36098
4,425
Downloads
6,663
Views
Citations
Water Quality in the Gaza Strip: The Present Scenario
(Articles)
Medhat Abbas
,
Maurizio Barbieri
,
Maria Battistel
,
Giuditta Brattini
,
Angelica Garone
,
Barbara Parisse
Journal of Water Resource and Protection
Vol.5 No.1
,January 25, 2013
DOI:
10.4236/jwarp.2013.51007
5,969
Downloads
10,008
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,251
Downloads
9,913
Views
Citations
A Formal Model of Conformity and Security Testing of Inheritance for Object Oriented Constraint Programming
(Articles)
Khalid Benlhachmi
,
Mohammed Benattou
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42013
4,497
Downloads
7,163
Views
Citations
Promoting sense of security in old-age care
(Articles)
Martina Boström
,
Marie Ernsth Bravell
,
Dan Lundgren
,
Anita Björklund
Health
Vol.5 No.6B
,June 17, 2013
DOI:
10.4236/health.2013.56A2009
8,152
Downloads
13,688
Views
Citations
This article belongs to the Special Issue on
Advances in Health Care and Rehabilitation Medicine
Local Communities Demand for Food Tree Species and the Potentialities of Their Landscapes in Two Ecological Zones of Burkina Faso
(Articles)
Daniabla Natacha Edwige Thiombiano
,
Niéyidouba Lamien
,
Ana M. Castro-Euler
,
Barbara Vinceti
,
Dolores Agundez
,
Issaka Joseph Boussim
Open Journal of Forestry
Vol.3 No.3
,July 18, 2013
DOI:
10.4236/ojf.2013.33014
4,007
Downloads
6,496
Views
Citations
Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security
(Articles)
Kuljeet Kaur
,
Geetha Ganesan
Journal of Information Security
Vol.4 No.4
,September 5, 2013
DOI:
10.4236/jis.2013.44022
4,139
Downloads
6,606
Views
Citations
Critical Energy Infrastructure: Cyberterrorism Threats and Means of Protection
(Articles)
V. A. Vasenin
Journal of Software Engineering and Applications
Vol.6 No.9A
,September 25, 2013
DOI:
10.4236/jsea.2013.69A003
6,424
Downloads
8,545
Views
Citations
This article belongs to the Special Issue on
Software Engineering for Safety-Critical Systems and Medical Devices
The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength
(Articles)
Zhilong Xiong
,
Rui Zhang
,
Xin Zhan
,
Zhenglin Liu
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2079
2,858
Downloads
4,803
Views
Citations
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World
(Articles)
Terry C. House
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2087
5,041
Downloads
6,329
Views
Citations
Research of Security Constrained Dispatching for Monthly Generation Plan
(Articles)
Rui Ge
,
Hai-chao Wang
,
Dun-nan Liu
Energy and Power Engineering
Vol.5 No.4B
,October 30, 2013
DOI:
10.4236/epe.2013.54B118
5,003
Downloads
6,023
Views
Citations
Communal Land Conflict and Food Security in Obudu Local Government Area of Cross River State, Nigeria
(Articles)
Francis Abul Uyang
,
Eucharia Nwabugo Nwagbara
,
Veronica Akwenabuaye Undelikwo
,
Rosemary Ine Eneji
Advances in Anthropology
Vol.3 No.4
,November 5, 2013
DOI:
10.4236/aa.2013.34027
6,609
Downloads
10,937
Views
Citations
Secure Communications for Two-Way Relay Networks Via Relay Chatting
(Articles)
Jun Xiong
,
Dongtang Ma
,
Chunguo Liu
,
Xin Wang
Communications and Network
Vol.5 No.3C
,November 7, 2013
DOI:
10.4236/cn.2013.53B2009
2,634
Downloads
4,205
Views
Citations
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
(Articles)
Xiao-min Ran
,
You-quan Mo
,
Yu-lei Chen
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2039
5,806
Downloads
7,133
Views
Citations
Influences of ±800 kV Yunnan-Guangdong HVDC System on Security and Stability of China Southern Power Grid
(Articles)
Baorong Zhou
,
Xiaoming Jin
,
Chao Hong
,
Pei Zhang
,
Zhigang Wu
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B233
6,299
Downloads
7,926
Views
Citations
The likely impact of genetically modified soybeans in the Brazilian collective feeding service
(Articles)
Silvia Magalhães Couto
,
Gabriela Morgado de Oliveira Coelho
,
Marina de Figueiredo Ferreira
,
Victor Augustus Marin
,
Regina Serrão Lanzillotti
,
Haydée Serrão Lanzillotti
Agricultural Sciences
Vol.4 No.12
,December 25, 2013
DOI:
10.4236/as.2013.412098
5,367
Downloads
7,365
Views
Citations
Identity Authentication Based on Two-Beam Interference
(Articles)
Wenqi He
,
Xiang Peng
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24005
4,152
Downloads
5,562
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,263
Downloads
6,668
Views
Citations
Contribution of Vertical Farms to Increase the Overall Energy Efficiency of Urban Agglomerations
(Articles)
Podmirseg Daniel
Journal of Power and Energy Engineering
Vol.2 No.4
,April 16, 2014
DOI:
10.4236/jpee.2014.24013
9,135
Downloads
10,628
Views
Citations
<
...
14
15
16
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top