Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
I-PRESENT
TM
: An Involutive Lightweight Block Cipher
(Articles)
Muhammad Reza Z’aba
,
Norziana Jamil
,
Mohd Ezanee Rusli
,
Md. Zaini Jamaludin
,
Ahmad Azlan Mohd Yasir
Journal of Information Security
Vol.5 No.3
,July 24, 2014
DOI:
10.4236/jis.2014.53011
4,352
Downloads
6,930
Views
Citations
Lightweight Study of Carbon Fiber Composite B-Pillar Based on Equal Stiffness Principle
(Articles)
Dongming Sun
,
Chao Tao
Open Access Library Journal
Vol.5 No.8
,August 30, 2018
DOI:
10.4236/oalib.1104822
750
Downloads
3,166
Views
Citations
On Lucas Sequences Computation
(Articles)
Aleksey Koval
Int'l J. of Communications, Network and System Sciences
Vol.3 No.12
,December 27, 2010
DOI:
10.4236/ijcns.2010.312128
6,183
Downloads
10,582
Views
Citations
Grobner Bases Method for Biometric Traits Identification and Encryption
(Articles)
Mohamed Sayed
Journal of Information Security
Vol.6 No.3
,July 24, 2015
DOI:
10.4236/jis.2015.63024
6,089
Downloads
7,018
Views
Citations
Properties Evaluation of Concrete using Local Used Bricks as Coarse Aggregate
(Articles)
Riaz Bhanbhro
,
Irfanullah Memon
,
Aziz Ansari
,
Ahsan Shah
,
Bashir Ahmed Memon
Engineering
Vol.6 No.5
,March 27, 2014
DOI:
10.4236/eng.2014.65025
5,244
Downloads
8,332
Views
Citations
Shale Stone and Fly Ash Landfill Use in Landslide Hazardous Area in Sirnak City with Foam Concrete
(Articles)
Yıldırım İ. Tosun
Geomaterials
Vol.4 No.4
,September 22, 2014
DOI:
10.4236/gm.2014.44014
4,628
Downloads
5,859
Views
Citations
Coupled-Nonlinear Elastic Structure: An Innovative Parameterization Scheme of the Motion Equations
(Articles)
S. A. David
Applied Mathematics
Vol.5 No.21
,December 11, 2014
DOI:
10.4236/am.2014.521324
6,732
Downloads
7,469
Views
Citations
The Light Weight Design of Mowing Vehicle Frame with a Combined Method
(Articles)
Shunming Li
,
Kun Xu
,
Jinrui Wang
Modern Mechanical Engineering
Vol.8 No.3
,July 17, 2018
DOI:
10.4236/mme.2018.83013
1,052
Downloads
2,494
Views
Citations
Durability of Lightweight Concrete Using Oil Palm Shell as Aggregates
(Articles)
Yasmine Binta Traore
,
Adamah Messan
,
Kinda Hannawi
,
Jean Gerard
,
William Prince
,
François Tsobnang
Open Journal of Civil Engineering
Vol.11 No.1
,January 29, 2021
DOI:
10.4236/ojce.2021.111001
568
Downloads
2,037
Views
Citations
Analysis of Security of Quantum Key Distribution Based on Entangled Photon Pairs by Model Checking
(Articles)
Surapol Rochanapratishtha
,
Wanchai Pijitrojana
Journal of Quantum Information Science
Vol.5 No.3
,September 16, 2015
DOI:
10.4236/jqis.2015.53012
3,818
Downloads
5,093
Views
Citations
On the Significance of Cryptography as a Service
(Articles)
Nick Rahimi
,
Jacob J. Reed
,
Bidyut Gupta
Journal of Information Security
Vol.9 No.4
,September 4, 2018
DOI:
10.4236/jis.2018.94017
1,321
Downloads
5,002
Views
Citations
On Security of Quantum Cryptography by Probabilistic Analysis
(Articles)
Jianzhong Zhao
Journal of Quantum Information Science
Vol.12 No.4
,December 1, 2022
DOI:
10.4236/jqis.2022.124008
119
Downloads
644
Views
Citations
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
(Articles)
Pawan Kumar
,
Vipin Saxena
Journal of Computer and Communications
Vol.12 No.2
,February 29, 2024
DOI:
10.4236/jcc.2024.122012
42
Downloads
174
Views
Citations
Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution
(Articles)
Fabio Garzia
,
Roberto Cusani
Communications and Network
Vol.2 No.3
,September 10, 2010
DOI:
10.4236/cn.2010.23025
7,140
Downloads
11,928
Views
Citations
A Secure Transfer of Identification Information in Medical Images by Steganocryptography
(Articles)
Shuhong Jiao
,
Robert Goutte
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310107
6,646
Downloads
11,030
Views
Citations
Quantum Key Distribution with Qubit Pairs
(Articles)
Mohd Asad Siddiqui
,
Tabish Qureshi
Journal of Quantum Information Science
Vol.4 No.3
,August 13, 2014
DOI:
10.4236/jqis.2014.43014
3,700
Downloads
5,405
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
1,194
Downloads
4,110
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
Towards Lightweight Requirements Documentation
(Articles)
Zheying Zhang
,
Mike Arvela
,
Eleni Berki
,
Matias Muhonen
,
Jyrki Nummenmaa
,
Timo Poranen
Journal of Software Engineering and Applications
Vol.3 No.9
,September 30, 2010
DOI:
10.4236/jsea.2010.39103
6,197
Downloads
12,016
Views
Citations
Integrated Design of a Compact and Lightweight S-Band Traveling-Wave Tube Amplifier for a New Class of Microwave Power Module
(Articles)
Heather Song
,
Leslie Tekamp
,
Frank Francisco
,
Ming-Chieh Lin
,
Peter H. Stoltz
,
David Smith
,
Gil Wong Choi
,
Jin Joo Choi
Journal of Electromagnetic Analysis and Applications
Vol.5 No.3
,March 28, 2013
DOI:
10.4236/jemaa.2013.53016
5,647
Downloads
8,721
Views
Citations
Lightweight Virtualization Cluster How to Overcome Cloud Vendor Lock-In
(Articles)
Nane Kratzke
Journal of Computer and Communications
Vol.2 No.12
,October 8, 2014
DOI:
10.4236/jcc.2014.212001
3,633
Downloads
5,161
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top