Scientific Research An Academic Publisher
OPEN ACCESS
Enhancing Multi-Factor Authentication in Modern Computing (Articles)
Ekwonwune Emmanuel Nwabueze, Iwuoha Obioha, Oju Onuoha
Communications and Network Vol.9 No.3,August 9, 2017
DOI: 10.4236/cn.2017.93012 990 Downloads 2,451 Views Citations
A Multinomial Theorem for Hermite Polynomials and Financial Applications (Articles)
Francois Buet-Golfouse
Applied Mathematics Vol.6 No.6,June 5, 2015
DOI: 10.4236/am.2015.66094 3,320 Downloads 4,095 Views Citations
Financial Market Pricing of Earnings Quality: Evidence from a Multi-Factor Return Model (Articles)
Gregory M. Dempster, Nathaniel T. Oliver
Open Journal of Business and Management Vol.7 No.1,January 23, 2019
DOI: 10.4236/ojbm.2019.71021 751 Downloads 1,265 Views Citations
Dividing the Expropriated Areas Based on Multi-Factor Comprehensive Evaluation—A Case Study of Gongcheng Yao Autonomous County (Articles)
Yuening Song, Xiangwen Cai, Mi Tang, Mingyuan Liu, Yan Zhao, Zehao Liu
Journal of Geographic Information System Vol.12 No.6,November 20, 2020
DOI: 10.4236/jgis.2020.126034 133 Downloads 241 Views Citations
The Counterfeit Electronics Problem (Articles)
Michael Pecht
Open Journal of Social Sciences Vol.1 No.7,December 12, 2013
DOI: 10.4236/jss.2013.17003 7,638 Downloads 9,770 Views Citations
Improved High Definition Multimedia Interface Authentication Mechanism (Articles)
R. N. Iyare, S. D. Walker
Journal of Computer and Communications Vol.2 No.12,October 22, 2014
DOI: 10.4236/jcc.2014.212003 3,050 Downloads 3,546 Views Citations
Leveraging 3D Benefits for Authentication (Articles)
Jonathan Gurary, Ye Zhu, Huirong Fu
Int'l J. of Communications, Network and System Sciences Vol.10 No.8B,September 4, 2017
DOI: 10.4236/ijcns.2017.108B035 946 Downloads 1,669 Views Citations
Improvement of an Anonymous and Lightweight Authentication Scheme for TMIS (Articles)
Chien-Ming Chen, Bin Xiang, Eric Wang Ke, Tsu-Yang Wu, Jerry Chun-Wei Lin
Journal of Applied Mathematics and Physics Vol.6 No.1,January 5, 2018
DOI: 10.4236/jamp.2018.61003 513 Downloads 894 Views Citations
Investment Value Evaluation of Hi-Tech Industry: Based on Multi-Factor Dynamic Model (Articles)
Chen Liu, Yang Liu
Open Journal of Business and Management Vol.2 No.3,July 25, 2014
DOI: 10.4236/ojbm.2014.23027 5,176 Downloads 6,152 Views Citations
Productivity Testing Design Method of Multi-Factor Control for Unconsolidated Sandstone Gas Reservoir (Articles)
Muwang Wu, Hao Liang, Mingjie Zhang, Dianqiang Sun, Peng Zhong
Engineering Vol.8 No.11,November 25, 2016
DOI: 10.4236/eng.2016.811073 1,003 Downloads 1,415 Views Citations
Quantitative Stock Selection Strategies Based on Kernel Principal Component Analysis (Articles)
Meiyi Zhou, Lianqian Yin
Journal of Financial Risk Management Vol.9 No.1,March 10, 2020
DOI: 10.4236/jfrm.2020.91002 307 Downloads 904 Views Citations
Analysis of Variance for Three-Way Unbalanced Mixed Effects Interactive Model (Articles)
Emmanuel W. Okereke, Joy C. Nwabueze, Stanislaus O. Obinyelu
Open Journal of Statistics Vol.10 No.2,April 22, 2020
DOI: 10.4236/ojs.2020.102019 168 Downloads 330 Views Citations
Increase Throughput of CCM Security Mode Using MKP (Articles)
Zuriati Ahmad Zukarnain
Applied Mathematics Vol.5 No.4,March 10, 2014
DOI: 10.4236/am.2014.54055 3,990 Downloads 5,102 Views Citations
A Solution to Implement Dynamic Authentication (Articles)
Bingbing Xia, Youping Dong
Open Journal of Applied Sciences Vol.2 No.3,September 28, 2012
DOI: 10.4236/ojapps.2012.23025 5,562 Downloads 8,160 Views Citations
Biometric-PKI Authentication System Using Fingerprint Minutiae (Articles)
Han-Ul Jang, Heung-Kyu Lee
Journal of Computer and Communications Vol.2 No.4,March 18, 2014
DOI: 10.4236/jcc.2014.24004 4,157 Downloads 6,022 Views Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study (Articles)
Yousef Al-Raba’nah, Mohammed Al-Refai
Journal of Computer and Communications Vol.4 No.16,December 9, 2016
DOI: 10.4236/jcc.2016.416002 1,605 Downloads 2,877 Views Citations
Contrast-Enhanced Ultrasonographic Detection and Dual-Phase Computed Tomographic Angiography in a 5-Year-Old Boxer with Pancreatic Insulinoma—Case Report (Articles)
Vilma Reunanen, Merja Laitinen
Open Journal of Veterinary Medicine Vol.5 No.7,July 24, 2015
DOI: 10.4236/ojvm.2015.57024 3,634 Downloads 4,130 Views Citations
A Way to Set up Security Layer over Internet (Articles)
Xiangyi Hu, Guifen Zhao, Guanning Xu
Journal of Computer and Communications Vol.3 No.5,May 25, 2015
DOI: 10.4236/jcc.2015.35022 2,346 Downloads 2,654 Views Citations
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility (Articles)
Zhikui CHEN, Song YANG
Communications and Network Vol.1 No.2,December 1, 2009
DOI: 10.4236/cn.2009.12012 6,112 Downloads 9,558 Views Citations
WEP and WPA Improvement (Articles)
Mustafa ElGili, Samani A. Talab, Awad H. Ali
Wireless Sensor Network Vol.2 No.3,April 12, 2010
DOI: 10.4236/wsn.2010.23032 6,038 Downloads 11,719 Views Citations