Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Introduction to Secure PRNGs
(Articles)
Majid Babaei
,
Mohsen Farhadi
Int'l J. of Communications, Network and System Sciences
Vol.4 No.10
,October 12, 2011
DOI:
10.4236/ijcns.2011.410074
6,058
Downloads
10,386
Views
Citations
Practical Stabilization of Counterfactual Quantum Cryptography
(Articles)
Musheng Jiang
,
Shihai Sun
,
Linmei Liang
Journal of Quantum Information Science
Vol.1 No.3
,December 9, 2011
DOI:
10.4236/jqis.2011.13016
3,876
Downloads
7,731
Views
Citations
A Visual Cryptography Based Digital Image Copyright Protection
(Articles)
Adel Hammad Abusitta
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32012
6,949
Downloads
12,855
Views
Citations
Fast Converging Series for Riemann Zeta Function
(Articles)
Hannu Olkkonen
,
Juuso T. Olkkonen
Open Journal of Discrete Mathematics
Vol.2 No.4
,November 1, 2012
DOI:
10.4236/ojdm.2012.24025
4,455
Downloads
8,062
Views
Citations
All-Optical EXOR for Cryptographic Application Based on Spatial Solitons
(Articles)
Mario Marco Corbelli
,
Fabio Garzia
,
Roberto Cusani
Journal of Information Security
Vol.4 No.3
,July 16, 2013
DOI:
10.4236/jis.2013.43020
3,459
Downloads
5,469
Views
Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
(Articles)
Sankita J. Patel
,
Ankit Chouhan
,
Devesh C. Jinwala
Journal of Information Security
Vol.5 No.1
,January 17, 2014
DOI:
10.4236/jis.2014.51002
5,334
Downloads
9,681
Views
Citations
Security and Privacy-Preserving Metering Service in the Smart Grid
(Articles)
Zhongwei Sun
,
Chuqi Song
Int'l J. of Communications, Network and System Sciences
Vol.10 No.8B
,August 14, 2017
DOI:
10.4236/ijcns.2017.108B033
1,064
Downloads
2,368
Views
Citations
An Algebraic Proof of the Associative Law of Elliptic Curves
(Articles)
Kazuyuki Fujii
,
Hiroshi Oike
Advances in Pure Mathematics
Vol.7 No.12
,December 12, 2017
DOI:
10.4236/apm.2017.712040
2,558
Downloads
5,468
Views
Citations
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes*
(Articles)
Sankhanil Dey
,
Ranjan Ghosh
Advances in Pure Mathematics
Vol.8 No.3
,March 22, 2018
DOI:
10.4236/apm.2018.83015
1,057
Downloads
3,526
Views
Citations
Security Framework for Distributed Database System
(Articles)
Allajabu Dafalla Khamis
,
Saad Subair
Journal of Data Analysis and Information Processing
Vol.7 No.1
,December 17, 2018
DOI:
10.4236/jdaip.2019.71001
1,219
Downloads
2,946
Views
Citations
Comparative Study of Different Cryptographic Algorithms
(Articles)
Baha Eldin Hamouda Hassan Hamouda
Journal of Information Security
Vol.11 No.3
,June 8, 2020
DOI:
10.4236/jis.2020.113009
1,611
Downloads
8,976
Views
Citations
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation
(Articles)
Protais Ndagijimana
,
Fulgence Nahayo
,
Marc Kokou Assogba
,
Adoté François-Xavier Ametepe
,
Juma Shabani
Journal of Information Security
Vol.11 No.3
,July 15, 2020
DOI:
10.4236/jis.2020.113010
561
Downloads
2,079
Views
Citations
Authentication Key-Exchange Using SMS for Web-Based Platforms
(Articles)
Benedicto B. Balilo Jr.
,
Jayvee Christopher N. Vibar
Journal of Computer and Communications
Vol.9 No.8
,August 3, 2021
DOI:
10.4236/jcc.2021.98001
234
Downloads
1,670
Views
Citations
A Quantum Mechanical Proof of Insecurity of the Theoretical QKD Protocols
(Articles)
Jianzhong Zhao
Journal of Quantum Information Science
Vol.12 No.3
,August 30, 2022
DOI:
10.4236/jqis.2022.123006
130
Downloads
853
Views
Citations
Blockchain-Based Islamic Marriage Certification with the Supremacy of Web 3.0
(Articles)
Md. Al-Sajiduzzaman Akand
,
Sarwar Azmain Reza
,
Amatul Bushra Akhi
Intelligent Control and Automation
Vol.13 No.4
,November 30, 2022
DOI:
10.4236/ica.2022.134004
117
Downloads
890
Views
Citations
Hardware Security for IoT in the Quantum Era: Survey and Challenges
(Articles)
Doudou Dione
,
Boly Seck
,
Idy Diop
,
Pierre-Louis Cayrel
,
Demba Faye
,
Ibrahima Gueye
Journal of Information Security
Vol.14 No.4
,August 8, 2023
DOI:
10.4236/jis.2023.144014
204
Downloads
1,225
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Numeric Identifier Transmission Algorithm Using Hash Function
(Articles)
Vladyslav Kutsman
Open Journal of Applied Sciences
Vol.13 No.9
,September 26, 2023
DOI:
10.4236/ojapps.2023.139125
51
Downloads
248
Views
Citations
Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket
(Articles)
Atsopmene Tango Vanette Eleonore
,
Gamom Ngounou Ewo Roland Christian
,
Kom Charles Hubert
Journal of Information Security
Vol.14 No.4
,October 25, 2023
DOI:
10.4236/jis.2023.144024
70
Downloads
368
Views
Citations
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
(Articles)
Vincent Mbonigaba
,
Fulgence Nahayo
,
Octave Moutsinga
,
Okalas-Ossami Dieudonné
Journal of Information Security
Vol.15 No.1
,January 31, 2024
DOI:
10.4236/jis.2024.151005
57
Downloads
245
Views
Citations
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.3
,March 29, 2024
DOI:
10.4236/jcc.2024.123016
28
Downloads
173
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top