Scientific Research An Academic Publisher
OPEN ACCESS
Trusted Heartbeat Framework for Cloud Computing (Articles)
Dipen Contractor, Dhiren Patel, Shreya Patel
Journal of Information Security Vol.7 No.3,April 1, 2016
DOI: 10.4236/jis.2016.73007 3,673 Downloads 4,576 Views Citations
A Threshold Signature Scheme Based on TPM (Articles)
Zhi-Hua Zhang, Si-Rong Zhang, Wen-Jin Yu, Jian-Jun Li, Bei Gong, Wei Jiang
Int'l J. of Communications, Network and System Sciences Vol.4 No.10,October 12, 2011
DOI: 10.4236/ijcns.2011.410075 4,723 Downloads 7,848 Views Citations
Opportunistic Unicast and Multicast Routing Protocol for VANET (Articles)
Zhizhong Jie, Chuanhe Huang, Liya Xu, Bo Wang, Wenzhong Yang, Xi Chen
Journal of Software Engineering and Applications Vol.6 No.6,June 19, 2013
DOI: 10.4236/jsea.2013.66040 4,886 Downloads 7,302 Views Citations
The Influence of Leader-Member Relationship on Staff under the Feeling Trusted (Articles)
Xue Yang
Open Journal of Business and Management Vol.7 No.2,March 28, 2019
DOI: 10.4236/ojbm.2019.72039 329 Downloads 616 Views Citations
Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace (Articles)
Hui Lin, Gyungho Lee
Journal of Information Security Vol.1 No.1,July 30, 2010
DOI: 10.4236/jis.2010.11001 6,595 Downloads 10,819 Views Citations
Morphotectonic Analysis of Burkh Anticline, North of Bastak (Zagros) (Articles)
Mohammad Khalaj
Open Journal of Geology Vol.5 No.6,June 10, 2015
DOI: 10.4236/ojg.2015.56036 4,790 Downloads 5,254 Views Citations
Non-invasive foetal heartbeat rate extraction from an underdetermined single signal (Articles)
Ranjan Acharyya, Neil L Scott, Paul D Teal
Health Vol.1 No.2,September 28, 2009
DOI: 10.4236/health.2009.12018 4,891 Downloads 9,541 Views Citations
Observer-Based Nonlinear Feedback Controls for Heartbeat ECG Tracking Systems (Articles)
Witt Thanom, Robert N. K. Loh
Intelligent Control and Automation Vol.3 No.3,August 30, 2012
DOI: 10.4236/ica.2012.33029 4,813 Downloads 7,058 Views Citations
A Fair Electronic Cash System with Identity-Based Group Signature Scheme (Articles)
Khalid. O. Elaalim, Shoubao Yang
Journal of Information Security Vol.3 No.2,April 26, 2012
DOI: 10.4236/jis.2012.32021 3,967 Downloads 6,910 Views Citations
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic (Articles)
Boris S. Verkhovsky, Roberto D. Rubino
Int'l J. of Communications, Network and System Sciences Vol.5 No.5,May 30, 2012
DOI: 10.4236/ijcns.2012.55033 4,665 Downloads 6,806 Views Citations
An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks (Articles)
Mohammad M. Shurman, Zaid A. Alomari, Khaldoon M. Mhaidat
Wireless Engineering and Technology Vol.5 No.3,July 11, 2014
DOI: 10.4236/wet.2014.53008 3,846 Downloads 4,839 Views Citations
A Security Architecture for SCADA Systems (Articles)
Arun Velagapalli, Mahalingam Ramkumar
Journal of Information Security Vol.9 No.1,January 23, 2018
DOI: 10.4236/jis.2018.91009 770 Downloads 1,866 Views Citations
Can Routers Provide Sufficient Protection against Cyber Security Attacks? (Articles)
David Leal, Sanjeev Kumar
Journal of Information Security Vol.10 No.4,October 31, 2019
DOI: 10.4236/jis.2019.104017 295 Downloads 787 Views Citations