Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service
(Articles)
Y. Harold Robinson
,
S. Balaji
,
M. Rajaram
Circuits and Systems
Vol.7 No.8
,June 29, 2016
DOI:
10.4236/cs.2016.78175
1,753
Downloads
2,782
Views
Citations
Determinants of Students’ Observance of Library Regulations in Federal Polytechnic Nekede, Owerri, Imo State, Nigeria
(Articles)
Adaora J. Udo-Anyanwu
,
Matilda C. Oduagwu
,
Nkechi O. Okorie1
Open Access Library Journal
Vol.2 No.4
,April 16, 2015
DOI:
10.4236/oalib.1101353
1,102
Downloads
3,084
Views
Citations
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense
(Articles)
Ghazi Al Sukkar
,
Ramzi Saifan
,
Sufian Khwaldeh
,
Mahmoud Maqableh
,
Iyad Jafar
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83012
3,664
Downloads
9,118
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,503
Downloads
2,626
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,531
Downloads
6,603
Views
Citations
The Place of Africa in the International Community: Prospects and Obstacles
(Articles)
Adams Oloo
Open Access Library Journal
Vol.3 No.4
,April 20, 2016
DOI:
10.4236/oalib.1102549
18,205
Downloads
37,933
Views
Citations
Security Implementation in WSN with Symmetric and Matrix Mapping on Asymmetric ECC Cryptographic Techniques
(Articles)
S. Hemalatha
,
V. Rajamani
,
V. Parthasarathy
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710273
2,052
Downloads
3,264
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,759
Downloads
2,578
Views
Citations
Potentials of the Groundnut Sector towards Achieving Food Security in Senegal
(Articles)
Ndiaye Georges
,
Shaoyong Fang
,
Mukete Beckline
,
Ye Wu
Open Access Library Journal
Vol.3 No.9
,September 5, 2016
DOI:
10.4236/oalib.1102991
2,411
Downloads
4,321
Views
Citations
Research on Financial Support Capacity of China’s Social Endowment Insurance by the Central and Local Governments—Analysis on the Statistic from 2009 to 2014
(Articles)
Tongbo Deng
Open Journal of Business and Management
Vol.4 No.4
,September 9, 2016
DOI:
10.4236/ojbm.2016.44067
1,983
Downloads
2,908
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,828
Downloads
3,258
Views
Citations
Strategic Agricultural Commodity Value Chains in Africa for Increased Food: The Regional Approach for Food Security
(Articles)
Mahamadou Nassirou Ba
Agricultural Sciences
Vol.7 No.9
,September 14, 2016
DOI:
10.4236/as.2016.79055
2,379
Downloads
5,625
Views
Citations
Tenure Security, Land Titles and Access to Formal Finance in Upgraded Informal Settlements: The Case of Dar es Salaam, Tanzania
(Articles)
Shaaban A. Sheuya
,
Marco M. Burra
Current Urban Studies
Vol.4 No.4
,November 4, 2016
DOI:
10.4236/cus.2016.44029
1,843
Downloads
4,382
Views
Citations
A Simple Security Proof for Entanglement-Based Quantum Key Distribution
(Articles)
Mhlambululi Mafu
Journal of Quantum Information Science
Vol.6 No.4
,December 21, 2016
DOI:
10.4236/jqis.2016.64018
2,003
Downloads
4,640
Views
Citations
Mental Health and Life Events of Overseas Children Left-Behind in China
(Articles)
Shengyu Zhao
,
Chuanjing Liao
Psychology
Vol.7 No.14
,December 27, 2016
DOI:
10.4236/psych.2016.714176
1,533
Downloads
3,209
Views
Citations
This article belongs to the Special Issue on
Child Psychology Research
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
(Articles)
Dognery Sinaly Silue
,
Wanggen Wan
,
Muhammad Rizwan
Open Journal of Applied Sciences
Vol.6 No.13
,December 28, 2016
DOI:
10.4236/ojapps.2016.613077
1,780
Downloads
2,881
Views
Citations
Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN)
(Articles)
Ahmed Alzubi
,
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/ijcns.2016.912047
1,699
Downloads
3,190
Views
Citations
A Systematic Approach for Cyber Security in Vehicular Networks
(Articles)
Farhan Ahmad
,
Asma Adnane
,
Virginia N. L. Franqueira
Journal of Computer and Communications
Vol.4 No.16
,December 29, 2016
DOI:
10.4236/jcc.2016.416004
2,127
Downloads
5,884
Views
Citations
This article belongs to the Special Issue on
Vehicular Communications and Networks
Program Counter Encoding for ARM
®
Architecture
(Articles)
Seho Park
,
Yongsuk Lee
,
Gyungho Lee
Journal of Information Security
Vol.8 No.1
,January 10, 2017
DOI:
10.4236/jis.2017.81004
1,754
Downloads
3,732
Views
Citations
Developing Dependability Requirements Engineering for Secure and Safe Information Systems with Knowledge Acquisition for Automated Specification
(Articles)
Mohammed Abu Lamddi
Journal of Software Engineering and Applications
Vol.10 No.2
,February 28, 2017
DOI:
10.4236/jsea.2017.102013
1,609
Downloads
3,037
Views
Citations
<
...
26
27
28
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top