Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Improvement of the Round Key Generation of AES
(Articles)
Junshe Wang
,
Han Xu
,
Mingqiu Yao
Int'l J. of Communications, Network and System Sciences
Vol.5 No.12
,December 27, 2012
DOI:
10.4236/ijcns.2012.512090
4,227
Downloads
6,347
Views
Citations
Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
(Articles)
Abou_el_ela Abdou Hussein
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121004
3,341
Downloads
10,937
Views
Citations
A Fast FPGA Implementation for Triple DES Encryption Scheme
(Articles)
Edni Del Rosal
,
Sanjeev Kumar
Circuits and Systems
Vol.8 No.9
,September 25, 2017
DOI:
10.4236/cs.2017.89016
2,047
Downloads
4,934
Views
Citations
AES Overhead Mitigation Using OpenMP
(Articles)
Hesham Alhumyani
Journal of Computer and Communications
Vol.7 No.7
,July 23, 2019
DOI:
10.4236/jcc.2019.77017
845
Downloads
1,579
Views
Citations
Analyzing Computational Components of Standard Block Encryption Schemes
(Articles)
Chu-Wen Cheng
,
Miranda Heather Cantu
,
Sanjeev Kumar
Journal of Computer and Communications
Vol.10 No.6
,June 30, 2022
DOI:
10.4236/jcc.2022.106007
113
Downloads
605
Views
Citations
This article belongs to the Special Issue on
Data Science and Applications
On Rijndael ByteSub Transformation
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.3
,March 28, 2019
DOI:
10.4236/am.2019.103010
724
Downloads
1,830
Views
Citations
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35003
3,833
Downloads
4,785
Views
Citations
Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries
(Articles)
Musaria K. Mahmood
,
Fawzi M. Al-Naima
Wireless Sensor Network
Vol.2 No.7
,July 9, 2010
DOI:
10.4236/wsn.2010.27064
5,623
Downloads
10,563
Views
Citations
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
(Articles)
Ping Zhang
,
Jianzhong Wang
Journal of Computer and Communications
Vol.3 No.9
,September 28, 2015
DOI:
10.4236/jcc.2015.39010
3,544
Downloads
4,382
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
130
Downloads
905
Views
Citations
Analysis of Secured Cloud Data Storage Model for Information
(Articles)
Emmanuel Nwabueze Ekwonwune
,
Udo Chukwuebuka Chigozie
,
Duroha Austin Ekekwe
,
Georgina Chekwube Nwankwo
Journal of Software Engineering and Applications
Vol.17 No.5
,May 28, 2024
DOI:
10.4236/jsea.2024.175017
38
Downloads
119
Views
Citations
A Modern Method for Constructing the S-Box of Advanced Encryption Standard
(Articles)
W. Eltayeb Ahmed
Applied Mathematics
Vol.10 No.4
,April 29, 2019
DOI:
10.4236/am.2019.104018
1,027
Downloads
6,833
Views
Citations
A High Efficiency Hardware Implementation of S-Boxes Based on Composite Field for Advanced Encryption Standard
(Articles)
Yawen Wang
,
Sini Bin
,
Shikai Zhu
,
Xiaoting Hu
Journal of Computer and Communications
Vol.12 No.4
,April 30, 2024
DOI:
10.4236/jcc.2024.124016
42
Downloads
189
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,834
Downloads
3,129
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,947
Downloads
4,907
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,565
Downloads
6,387
Views
Citations
Data Security of Mobile Cloud Computing on Cloud Server
(Articles)
Mohammad Waseem
,
Abdullah Lakhan
,
Irfan Ali Jamali
Open Access Library Journal
Vol.3 No.4
,April 28, 2016
DOI:
10.4236/oalib.1102377
1,752
Downloads
7,619
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104012
1,243
Downloads
5,134
Views
Citations
A Novel Hybrid Encryption Method Based on Honey Encryption and Advanced DNA Encoding Scheme in Key Generation
(Articles)
Nwe Ni Khin
,
Thanda Win
Journal of Computer and Communications
Vol.10 No.9
,September 9, 2022
DOI:
10.4236/jcc.2022.109002
139
Downloads
781
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
The Use of Life Narrative and Living Standard Measurement Survey Data in the Study of Poverty in the Caribbean: A Resolution of Conflicting Epistemologies
(Articles)
Dennis A. V. Brown
Sociology Mind
Vol.3 No.3
,June 28, 2013
DOI:
10.4236/sm.2013.33030
5,510
Downloads
7,834
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top