Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Visual Cryptography Based Digital Image Copyright Protection
(Articles)
Adel Hammad Abusitta
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32012
6,949
Downloads
12,857
Views
Citations
The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength
(Articles)
Zhilong Xiong
,
Rui Zhang
,
Xin Zhan
,
Zhenglin Liu
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2079
2,756
Downloads
4,593
Views
Citations
Intellectual Property Knowledge at the University’s Information Environment: A Comparative Study
(Articles)
Tereza Trencheva
,
Stoyan Denchev
Open Journal of Applied Sciences
Vol.4 No.3
,March 11, 2014
DOI:
10.4236/ojapps.2014.43013
2,570
Downloads
4,226
Views
Citations
A Code Correlation Comparison of the DOS and CP/M Operating Systems
(Articles)
Robert Zeidman
Journal of Software Engineering and Applications
Vol.7 No.6
,May 28, 2014
DOI:
10.4236/jsea.2014.76048
7,943
Downloads
11,851
Views
Citations
This article belongs to the Special Issue on
Software Analysis and Testing
Authentication Method Using a Discrete Wavelet Transform for a Digital Moving Image
(Articles)
Ren Fujii
,
Yasunari Yoshitomi
,
Taro Asada
,
Masayoshi Tabuse
Journal of Information Security
Vol.7 No.1
,January 28, 2016
DOI:
10.4236/jis.2016.71001
4,645
Downloads
5,594
Views
Citations
Is There an Actual Need of Registration? Reflections on Free Formality Principle
(Articles)
Ergysa Ikonomi
Beijing Law Review
Vol.11 No.4
,December 18, 2020
DOI:
10.4236/blr.2020.114053
236
Downloads
717
Views
Citations
Τhe Exception of Text and Data Mining from the Academic Libraries Standpoint
(Articles)
Maria-Daphne Papadopoulou
,
Krystallenia Kolotourou
,
Maria Bottis
Open Journal of Social Sciences
Vol.9 No.5
,May 25, 2021
DOI:
10.4236/jss.2021.95028
326
Downloads
1,856
Views
Citations
Analysis on the Utility and Implementation Path of Copyright Insurance Based on Blockchain
(Articles)
Yiding Li
Open Journal of Social Sciences
Vol.9 No.7
,July 30, 2021
DOI:
10.4236/jss.2021.97039
196
Downloads
633
Views
Citations
Research on Software Design of Image Copyright Protection in the Field of Education
(Articles)
Yu Huang
,
Zhengyue Han
,
Zhenjie Wu
,
Hanyue Zhang
,
Rong Wu
Int'l J. of Communications, Network and System Sciences
Vol.15 No.4
,April 27, 2022
DOI:
10.4236/ijcns.2022.154004
122
Downloads
464
Views
Citations
Appraising the Impact of the Nigerian Copyright Act and Regulations in Combating Piracy in Nigeria
(Articles)
Uchechukwu Uguru
,
Moses C. Umobong
Beijing Law Review
Vol.13 No.2
,May 5, 2022
DOI:
10.4236/blr.2022.132016
240
Downloads
2,890
Views
Citations
From Animals to Artificial Intelligence: Non-Human Beings’ Intellectual Property Protection by “Judicial Capacity for Copyrights”
(Articles)
Zihang Lan
Beijing Law Review
Vol.13 No.4
,November 1, 2022
DOI:
10.4236/blr.2022.134045
198
Downloads
1,696
Views
Citations
Can Software Developers Own the Copyright to Any User-Generated Content in a Virtual World? A Comparative Analysis Perspective
(Articles)
Linxin Xie
Beijing Law Review
Vol.14 No.3
,September 5, 2023
DOI:
10.4236/blr.2023.143063
63
Downloads
398
Views
Citations
Frequent Breaches in Irrigation Canals in Sindh Pakistan
(Articles)
Riaz Bhanbhro
,
Nadhir Al-Ansari
,
Sven Knutsson
Journal of Water Resource and Protection
Vol.6 No.4
,March 20, 2014
DOI:
10.4236/jwarp.2014.64027
8,326
Downloads
12,188
Views
Citations
How Psychological Contract Breach Influences Organizational Identification and Organizational Citizenship Behavior: The Mediating Role of Psychological Capital
(Articles)
Wanjun Yang
,
Lin Chao
American Journal of Industrial and Business Management
Vol.6 No.8
,August 31, 2016
DOI:
10.4236/ajibm.2016.68089
2,484
Downloads
5,265
Views
Citations
Does the Employee’s Work Attitude and Work Behavior Have the Same Stability? —A Empirical Study Based on Psychological Contract Breach
(Articles)
Biaobin Yan
,
Xiaoling Huang
,
Xueying Chen
Open Journal of Social Sciences
Vol.6 No.10
,October 30, 2018
DOI:
10.4236/jss.2018.610014
936
Downloads
2,526
Views
Citations
Pricing Cyber Security Insurance
(Articles)
Zhaoxin Lin
,
Travis R. A. Sapp
,
Rahul Parsa
,
Jackie Rees Ulmer
,
Chengxin Cao
Journal of Mathematical Finance
Vol.12 No.1
,January 18, 2022
DOI:
10.4236/jmf.2022.121003
355
Downloads
2,450
Views
Citations
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
(Articles)
Chevroen Washington
,
Phillip Yarbrough
,
Shavon Parker
,
Rafia Islam
,
Vishnu Vardhan Patamsetti
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.15 No.2
,February 17, 2022
DOI:
10.4236/ijcns.2022.152002
284
Downloads
1,793
Views
Citations
Identification of the Breach of Short-Term Rental Regulations in Irish Rent Pressure Zones
(Articles)
Guowen Liu
,
Inmaculada Arnedillo-Sánchez
,
Zhenshuo Chen
Journal of Computer and Communications
Vol.11 No.2
,February 20, 2023
DOI:
10.4236/jcc.2023.112002
81
Downloads
499
Views
Citations
This article belongs to the Special Issue on
Image Processing and Machine Learning
A Watermarking Algorithm Based on Wavelet and Hadamard Transform for Color Image
(Articles)
Hongshou Yan
,
Weimin Yang
Journal of Software Engineering and Applications
Vol.6 No.3B
,April 11, 2013
DOI:
10.4236/jsea.2013.63B013
3,892
Downloads
5,851
Views
Citations
International Exhaustion, Parallel Imports, and the Conflict between the Patent and Copyright Laws of the United States
(Articles)
Christopher J. Clugston
Beijing Law Review
Vol.4 No.3
,September 30, 2013
DOI:
10.4236/blr.2013.43012
7,247
Downloads
11,740
Views
Citations
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top