Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Is Public Co-Ordination of Investment in Information Security Desirable?
(Articles)
Christos Ioannidis
,
David Pym
,
Julian Williams
Journal of Information Security
Vol.7 No.2
,March 30, 2016
DOI:
10.4236/jis.2016.72005
2,979
Downloads
3,913
Views
Citations
This article belongs to the Special Issue on
Cybersecurity Investments
Information Availability: An Insight into the Most Important Attribute of Information Security
(Articles)
Suhail Qadir
,
S. M. K. Quadri
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73014
7,065
Downloads
20,244
Views
Citations
Information Systems Security Threats and Vulnerabilities: A Case of the Institute of Accountancy Arusha (IAA)
(Articles)
Adam Aloyce Semlambo
,
Didas Malekia Mfoi
,
Yona Sangula
Journal of Computer and Communications
Vol.10 No.11
,November 3, 2022
DOI:
10.4236/jcc.2022.1011003
221
Downloads
2,272
Views
Citations
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61001
4,164
Downloads
6,076
Views
Citations
Analysis of the Problems of Ensuring Information Security in the Terms of the Contemporary Society
(Articles)
Dmitrii S. Brazevich
,
Zhanna S. Safronova
,
Tatyana N. Kosheleva
,
Alla V. Biryukova
Open Journal of Social Sciences
Vol.8 No.2
,February 28, 2020
DOI:
10.4236/jss.2020.82018
760
Downloads
2,561
Views
Citations
Scheme for Secure Communication via Information Hiding Based on Key Exchange and Decomposition Protocols
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42009
4,230
Downloads
7,710
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
171
Downloads
819
Views
Citations
Classification of Big Data Security Based on Ontology Web Language
(Articles)
Alsadig Mohammed Adam Abdallah
,
Amir Mohamed Talib
Journal of Information Security
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/jis.2023.141006
154
Downloads
740
Views
Citations
Nelder-Mead Based Iterative Algorithm for Optimal Antenna Beam Patterns in Ad Hoc Networks
(Articles)
Vinay B. Ramakrishnaiah
,
Robert F. Kubichek
,
Suresh S. Muknahallipatna
Journal of Computer and Communications
Vol.5 No.7
,May 23, 2017
DOI:
10.4236/jcc.2017.57012
1,171
Downloads
2,094
Views
Citations
Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45033
3,838
Downloads
7,256
Views
Citations
Performance Analysis of Techniques Used for Determining Land Mines
(Articles)
Yavuz Ege
,
Adnan Kakilli
,
Osman Kılıç
,
Hüseyin Çalık
,
Hakan Çıtak
,
Sedat Nazlıbilek
,
Osman Kalender
International Journal of Geosciences
Vol.5 No.10
,September 26, 2014
DOI:
10.4236/ijg.2014.510098
4,083
Downloads
5,966
Views
Citations
This article belongs to the Special Issue on
Geomagnetic Field
Robust Performance of Scene Matching Algorithm
(Articles)
Zhaohui Xia
,
Xiaogang Yang
,
Fei Meng
,
Shicheng Wang
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B002
3,744
Downloads
5,072
Views
Citations
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
(Articles)
Muhammad Ariful Islam
,
Md. Ashraful Islam
,
Nazrul Islam
,
Boishakhi Shabnam
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63006
2,981
Downloads
8,198
Views
Citations
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm
(Articles)
Youhai Shao
,
Yong Wang
,
Yun Yang
,
Xiang Wang
Journal of Computer and Communications
Vol.10 No.1
,January 17, 2022
DOI:
10.4236/jcc.2022.101003
196
Downloads
1,284
Views
Citations
Impact of Information Technology on the Supply Chain Performance of the Car Segmentation Companies with Emphasis on the Integrity and Flexibility
(Articles)
Mahshid Mashreghi
,
Ebrahim Kalani
,
Alireza Elhami
,
Abas Farajpoor Alamdari
,
Iraj Bakhtiyari
,
Ehsan Kamrani
American Journal of Industrial and Business Management
Vol.8 No.2
,February 26, 2018
DOI:
10.4236/ajibm.2018.82021
1,049
Downloads
7,762
Views
Citations
Selection of Investment Basis Using Neural Networks in Stock Exchange
(Articles)
Ebrahim Kalani
,
Alireza Elhami
,
Reza Baradaran Kazem-Zadeh
,
Ehsan Kamrani
American Journal of Industrial and Business Management
Vol.8 No.3
,March 20, 2018
DOI:
10.4236/ajibm.2018.83036
714
Downloads
1,825
Views
Citations
Effects of Quality and Quantity of Information Processing on Design Coordination Performance
(Articles)
R. Zhang
,
A. M. M. Liu
,
I. Y. S. Chan
World Journal of Engineering and Technology
Vol.6 No.2B
,May 22, 2018
DOI:
10.4236/wjet.2018.62B005
634
Downloads
1,743
Views
Citations
Playing against Hedge
(Articles)
Miltiades E. Anagnostou
,
Maria A. Lambrou
Int'l J. of Communications, Network and System Sciences
Vol.7 No.12
,December 3, 2014
DOI:
10.4236/ijcns.2014.712050
2,476
Downloads
3,253
Views
Citations
Knowledge Economics: Summary and Rationality
(Articles)
Bhekuzulu Khumalo
Modern Economy
Vol.8 No.12
,December 19, 2017
DOI:
10.4236/me.2017.812102
755
Downloads
2,251
Views
Citations
Treatment and Hardware Removal after Lisfranc Injury: A Narrative Review
(Articles)
Prasenjit Saha
,
Matthew Smith
,
Khalid Hasan
Open Journal of Orthopedics
Vol.13 No.12
,December 19, 2023
DOI:
10.4236/ojo.2023.1312049
37
Downloads
619
Views
Citations
This article belongs to the Special Issue on
Orthopedics and Orthopedic Surgery
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top