Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks
(Articles)
Hossein Fereidooni
,
Hassan Taheri
,
Mehran Mahramian
Int'l J. of Communications, Network and System Sciences
Vol.5 No.4
,April 19, 2012
DOI:
10.4236/ijcns.2012.54030
6,828
Downloads
11,235
Views
Citations
How a Key Currency Functions as an International Liquidity Provision and Insurance System
(Articles)
Masayuki Otaki
Theoretical Economics Letters
Vol.3 No.1
,February 26, 2013
DOI:
10.4236/tel.2013.31007
4,509
Downloads
7,482
Views
Citations
Timing Attack Analysis on AA
β
Cryptosystem
(Articles)
A. H. A. Ghafar
,
M. R. K. Ariffin
Journal of Computer and Communications
Vol.2 No.4
,March 17, 2014
DOI:
10.4236/jcc.2014.24001
3,497
Downloads
5,095
Views
Citations
Cryptographic Protocols Based on Nielsen Transformations
(Articles)
Benjamin Fine
,
Anja I. S. Moldenhauer
,
Gerhard Rosenberger
Journal of Computer and Communications
Vol.4 No.12
,October 31, 2016
DOI:
10.4236/jcc.2016.412004
1,530
Downloads
2,413
Views
Citations
This article belongs to the Special Issue on
Coding and Cryptography
A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
(Articles)
Shunbo Xiang
,
Bing Xu
,
Ke Chen
Journal of Computer and Communications
Vol.9 No.4
,April 29, 2021
DOI:
10.4236/jcc.2021.94007
330
Downloads
1,065
Views
Citations
This article belongs to the Special Issue on
Information Technology and Applications
Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment
(Articles)
Amirhossein Ebrahimzadeh
,
Abolfazl Falahati
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41001
5,854
Downloads
11,463
Views
Citations
Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries
(Articles)
Musaria K. Mahmood
,
Fawzi M. Al-Naima
Wireless Sensor Network
Vol.2 No.7
,July 9, 2010
DOI:
10.4236/wsn.2010.27064
5,615
Downloads
10,631
Views
Citations
Chaotic Encryption Scheme Using 1-D Chaotic Map
(Articles)
Mina Mishra
,
Vijay H. Mankar
Int'l J. of Communications, Network and System Sciences
Vol.4 No.7
,July 6, 2011
DOI:
10.4236/ijcns.2011.47054
5,513
Downloads
9,512
Views
Citations
Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression
(Articles)
Shinichi Murata
,
Yasunari Yoshitomi
,
Hiroaki Ishii
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23010
6,827
Downloads
13,840
Views
Citations
Formal Verification of Secrecy in Group Key Protocols Using Event-B
(Articles)
Amjad Gawanmeh
,
Sofiène Tahar
,
Leila Jemni Ben Ayed
Int'l J. of Communications, Network and System Sciences
Vol.5 No.3
,March 21, 2012
DOI:
10.4236/ijcns.2012.53021
3,810
Downloads
6,187
Views
Citations
Improvement of the Round Key Generation of AES
(Articles)
Junshe Wang
,
Han Xu
,
Mingqiu Yao
Int'l J. of Communications, Network and System Sciences
Vol.5 No.12
,December 27, 2012
DOI:
10.4236/ijcns.2012.512090
4,188
Downloads
6,493
Views
Citations
Research on compound chaos image encryption method with clock- varying
(Articles)
Xing MENG
,
XiaoMan WANG
,
Ying CHU
Open Journal of Applied Sciences
Vol.2 No.4B
,January 9, 2013
DOI:
10.4236/ojapps.2012.24B003
3,465
Downloads
5,034
Views
Citations
Management Performance Evaluation Model of Korean Construction Firms
(Articles)
Donghoon Lee
,
Manki Kim
,
Sunkuk Kim
Journal of Building Construction and Planning Research
Vol.1 No.2
,June 5, 2013
DOI:
10.4236/jbcpr.2013.12005
8,243
Downloads
15,278
Views
Citations
Transmission over Cognitive Radio Channel with Novel Secure LT Code
(Articles)
Elham Hosseini
,
Abolfazl Falahati
Communications and Network
Vol.5 No.3
,August 2, 2013
DOI:
10.4236/cn.2013.53023
4,794
Downloads
6,940
Views
Citations
Efficient Implementations of NTRU in Wireless Network
(Articles)
Xin Zhan
,
Rui Zhang
,
Zhilong Xiong
,
Zhaoxia Zheng
,
Zhenglin Liu
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2089
5,029
Downloads
6,857
Views
Citations
Vehicle Relay Attack Avoidance Methods Using RF Signal Strength
(Articles)
Gyu-Ho Kim
,
Kwan-Hyung Lee
,
Shim-Soo Kim
,
Ju-Min Kim
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2103
7,197
Downloads
11,375
Views
Citations
Key Universal Activities of Mathematical Learning in Problem Solving Mathematics Classroom
(Articles)
Saastra Laah-On
,
Pimpaka Intaros
,
Kiat Sangaroon
Creative Education
Vol.4 No.11
,November 4, 2013
DOI:
10.4236/ce.2013.411099
4,487
Downloads
8,360
Views
Citations
Method and Apparatus for Creating Problem-Solving Complexes from Individual Elements
(Articles)
Bernhard Mitterauer
Advances in Bioscience and Biotechnology
Vol.5 No.4
,February 28, 2014
DOI:
10.4236/abb.2014.54038
3,336
Downloads
4,552
Views
Citations
Analysis of the Key Challenges Facing Potato Farmers in Oljoro-Orok Division, Kenya
(Articles)
Amon Mwangi Karanja
,
Chris Shisanya
,
George Makokha
Agricultural Sciences
Vol.5 No.10
,August 12, 2014
DOI:
10.4236/as.2014.510088
8,901
Downloads
14,048
Views
Citations
Top 10 Key Risk Factors of GZA Project Implementation Are Analyzed with Interpretative Structural Model
(Articles)
Jiangping Wan
,
Guangwei Pan
Open Journal of Business and Management
Vol.2 No.4
,August 22, 2014
DOI:
10.4236/ojbm.2014.24032
2,996
Downloads
3,710
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top