Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Establishment and Application of Cryptographic Library Model
(Articles)
Tie-Ming Liu
,
Lie-Hui Jiang
,
Jing Jing
,
Yuan-Yuan Zhang
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35003
3,820
Downloads
4,796
Views
Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
(Articles)
Boris S. Verkhovsky
,
Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences
Vol.5 No.5
,May 30, 2012
DOI:
10.4236/ijcns.2012.55033
4,920
Downloads
7,209
Views
Citations
Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45033
3,833
Downloads
7,251
Views
Citations
An Efficient Trusted Computing Base for MANET Security
(Articles)
Somya D. Mohanty
,
Vinay Thotakura
,
Mahalingam Ramkumar
Journal of Information Security
Vol.5 No.4
,October 7, 2014
DOI:
10.4236/jis.2014.54018
3,612
Downloads
4,678
Views
Citations
Transmission over Cognitive Radio Channel with Novel Secure LT Code
(Articles)
Elham Hosseini
,
Abolfazl Falahati
Communications and Network
Vol.5 No.3
,August 2, 2013
DOI:
10.4236/cn.2013.53023
4,790
Downloads
6,935
Views
Citations
Random but System-Wide Unique Unlinkable Parameters
(Articles)
Peter Schartner
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31001
7,288
Downloads
11,175
Views
Citations
All-Optical Cryptographic Device for Secure Communication
(Articles)
Fabio Garzia
,
Roberto Cusani
Communications and Network
Vol.2 No.4
,December 2, 2010
DOI:
10.4236/cn.2010.24034
6,772
Downloads
11,158
Views
Citations
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
(Articles)
Moad Mowafi
,
Lo'ai Tawalbeh
,
Walid Aljoby
,
Mohammad Al-Rousan
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34034
4,035
Downloads
7,249
Views
Citations
Three-Party Simultaneous Quantum Secure Communication Based on Closed Transmission Loops
(Articles)
Xunru Yin
Journal of Quantum Information Science
Vol.4 No.4
,December 31, 2014
DOI:
10.4236/jqis.2014.44024
4,671
Downloads
5,471
Views
Citations
RFID Anti-Counterfeiting for Retailing Systems
(Articles)
Duy-Thinh Tran
,
Sung Je Hong
Journal of Applied Mathematics and Physics
Vol.3 No.1
,January 28, 2015
DOI:
10.4236/jamp.2015.31001
3,926
Downloads
5,495
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,497
Downloads
2,614
Views
Citations
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions
(Articles)
Nahla Fatahelrahman Ibrahim
,
Johnson Ihyeh Agbinya
Advances in Internet of Things
Vol.12 No.1
,January 19, 2022
DOI:
10.4236/ait.2022.121002
342
Downloads
1,700
Views
Citations
Erratum to “Solutions of Indefinite Equations”, [Advances in Pure Mathematics Vol. 10, No. 9, (2020) 540-544]
(Articles)
Zengyong Liang
Advances in Pure Mathematics
Vol.12 No.4
,April 22, 2022
DOI:
10.4236/apm.2022.124023
159
Downloads
684
Views
Citations
Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication
(Articles)
Boris Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.4 No.4
,April 15, 2011
DOI:
10.4236/ijcns.2011.44024
5,599
Downloads
9,998
Views
Citations
On Stable Reconstruction of the Impact in the System of Ordinary Differential Equations
(Articles)
Andrei Y. Vdovin
,
Svetlana S. Rubleva
Applied Mathematics
Vol.1 No.2
,July 22, 2010
DOI:
10.4236/am.2010.12015
6,466
Downloads
14,448
Views
Citations
Optimal Reconfiguration of Power Distribution Systems Based on Symbiotic Organism Search Algorithm
(Articles)
Alexandre Teplaira Boum
,
Patrik Roger Ndjependa
,
Jacquie Ngo Bisse
Journal of Power and Energy Engineering
Vol.5 No.11
,November 17, 2017
DOI:
10.4236/jpee.2017.511001
1,158
Downloads
2,544
Views
Citations
Study of the Interception Scheme Based on A* Path Finding Algorithm in Computer Game
(Articles)
Zhenjie Li
,
Haiming Li
Journal of Computer and Communications
Vol.8 No.7
,July 30, 2020
DOI:
10.4236/jcc.2020.87004
499
Downloads
1,773
Views
Citations
A Complex Encryption System Design Implemented by AES
(Articles)
Zhimao Lu
,
Houmed Mohamed
Journal of Information Security
Vol.12 No.2
,April 30, 2021
DOI:
10.4236/jis.2021.122009
553
Downloads
3,569
Views
Citations
Nature Scene Signs Recognition by Affine Scale-Invariant Feature Transform
(Articles)
Xin Li
,
Liuguang Song
,
Yuqi Sun
Open Access Library Journal
Vol.8 No.12
,December 24, 2021
DOI:
10.4236/oalib.1108225
62
Downloads
357
Views
Citations
Integrated Optimization of Mechanisms with Genetic Algorithms
(Articles)
Jean-Luc Marcelin
Engineering
Vol.2 No.6
,July 1, 2010
DOI:
10.4236/eng.2010.26057
6,828
Downloads
11,243
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top