Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Review of Lightweight Cryptographic Schemes and Fundamental Cryptographic Characteristics of Boolean Functions
(Articles)
Nahla Fatahelrahman Ibrahim
,
Johnson Ihyeh Agbinya
Advances in Internet of Things
Vol.12 No.1
, January 19, 2022
DOI:
10.4236/ait.2022.121002
587
Downloads
2,688
Views
Citations
A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes*
(Articles)
Sankhanil Dey
,
Ranjan Ghosh
Advances in Pure Mathematics
Vol.8 No.3
, March 22, 2018
DOI:
10.4236/apm.2018.83015
1,245
Downloads
4,330
Views
Citations
I-PRESENT
TM
: An Involutive Lightweight Block Cipher
(Articles)
Muhammad Reza Z’aba
,
Norziana Jamil
,
Mohd Ezanee Rusli
,
Md. Zaini Jamaludin
,
Ahmad Azlan Mohd Yasir
Journal of Information Security
Vol.5 No.3
, July 24, 2014
DOI:
10.4236/jis.2014.53011
4,721
Downloads
7,520
Views
Citations
Chaotic Encryption Scheme Using 1-D Chaotic Map
(Articles)
Mina Mishra
,
Vijay H. Mankar
International Journal of Communications, Network and System Sciences
Vol.4 No.7
, July 6, 2011
DOI:
10.4236/ijcns.2011.47054
5,877
Downloads
10,149
Views
Citations
FPGA Implementation of Non-Linear Cryptography
(Articles)
Thammampatti Natarajan Prabakar
,
Balasubramanian Lakshmi
,
Gopalakrishnan Seetharaman
Circuits and Systems
Vol.7 No.8
, June 7, 2016
DOI:
10.4236/cs.2016.78109
2,187
Downloads
3,962
Views
Citations
Major Existing Classification Matrices and Future Directions for Internet of Things
(Articles)
Kedir Mamo Basher
,
Juan-Ivan Nieto-Hipolito
,
Maria De Los Angeles Cosio Leon
,
Mabel Vazquez-Briseno
,
Juan de Dios Sánchez López
,
Raymundo Buenrostro Mariscal
Advances in Internet of Things
Vol.7 No.4
, September 27, 2017
DOI:
10.4236/ait.2017.74008
1,817
Downloads
4,116
Views
Citations
MAEB: Routing Protocol for IoT Healthcare
(Articles)
Haoru Su
,
Zhiliang Wang
,
Sunshin An
Advances in Internet of Things
Vol.3 No.2A
, June 18, 2013
DOI:
10.4236/ait.2013.32A002
8,378
Downloads
12,941
Views
Citations
This article belongs to the Special Issue on
The Future of Iot on Patient-Centred Healthcare and Smart Living
How Secure Having IoT Devices in Our Homes?
(Articles)
Debora Estrada
,
Lo’ai Tawalbeh
,
Robert Vinaja
Journal of Information Security
Vol.11 No.2
, March 19, 2020
DOI:
10.4236/jis.2020.112005
1,384
Downloads
4,343
Views
Citations
Internet of Things Security: Threats, Recent Trends, and Mitigation Approaches
(Articles)
Laila Tageldin
Advances in Internet of Things
Vol.15 No.1
, March 4, 2025
DOI:
10.4236/ait.2025.151001
308
Downloads
2,074
Views
Citations
Cryptanalysis of TEA Using Quantum-Inspired Genetic Algorithms
(Articles)
Wei Hu
Journal of Software Engineering and Applications
Vol.3 No.1
, January 28, 2010
DOI:
10.4236/jsea.2010.31006
8,919
Downloads
14,251
Views
Citations
Cryptanalysis of a Substitution-Permutation Network Using Gene Assembly in Ciliates
(Articles)
Arash Karimi
,
Hadi Shahriar Shahhoseini
International Journal of Communications, Network and System Sciences
Vol.5 No.3
, March 21, 2012
DOI:
10.4236/ijcns.2012.53020
6,378
Downloads
9,556
Views
Citations
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions
(Articles)
Mohammad Rafsun Islam
,
K. M. Aktheruzzaman
Journal of Computer and Communications
Vol.8 No.4
, April 2, 2020
DOI:
10.4236/jcc.2020.84002
2,649
Downloads
10,674
Views
Citations
A Review of Identity Methods of Internet of Things (IOT)
(Articles)
Sana Abdelaziz Bkheet
,
Johnson I. Agbinya
Advances in Internet of Things
Vol.11 No.4
, October 13, 2021
DOI:
10.4236/ait.2021.114011
1,501
Downloads
13,710
Views
Citations
Potential and Trends of IoT Application in Agriculture in Vietnam
(Articles)
Doan Minh Quan
,
Tran Thi Hai Van
Open Journal of Social Sciences
Vol.10 No.1
, January 20, 2022
DOI:
10.4236/jss.2022.101015
715
Downloads
4,009
Views
Citations
Wi-Fi: WPA2 Security Vulnerability and Solutions
(Articles)
Zahoor Ahmad Najar
,
Roohe Naaz Mir
Wireless Engineering and Technology
Vol.12 No.2
, April 18, 2021
DOI:
10.4236/wet.2021.122002
784
Downloads
4,806
Views
Citations
CrowdIoT: The Crowd-Sourcing Test System for IoT Devices Based on Blockchain
(Articles)
Yifan Lin
,
Zhiji Li
,
Wenbo Yue
,
Jinghang Wen
Advances in Internet of Things
Vol.12 No.2
, March 8, 2022
DOI:
10.4236/ait.2022.122003
513
Downloads
2,066
Views
Citations
Management of Water Treatment Systems Automatically via the Internet of Things
(Articles)
Phra Boontham Choomyen
,
Benchalak Muangmeesri
,
Dechrit Maneetham
Engineering
Vol.14 No.9
, September 13, 2022
DOI:
10.4236/eng.2022.149030
277
Downloads
1,398
Views
Citations
Agile Factor Flexible Industry 4.0 with MES Manufacturing Execution System Along with ERP Back-End Integration: Ready-Made Garments as a Case Study
(Articles)
Mohamed Mostafa Mohamed
,
Abdulaziz Saleh Alraddadi
American Journal of Operations Research
Vol.14 No.4
, July 31, 2024
DOI:
10.4236/ajor.2024.144007
234
Downloads
1,533
Views
Citations
Internet of Things Business Models
(Articles)
Hubert C. Y. Chan
Journal of Service Science and Management
Vol.8 No.4
, August 12, 2015
DOI:
10.4236/jssm.2015.84056
17,345
Downloads
26,410
Views
Citations
Algebraic Cryptanalysis of GOST Encryption Algorithm
(Articles)
Ludmila Babenko
,
Ekaterina Maro
Journal of Computer and Communications
Vol.2 No.4
, March 17, 2014
DOI:
10.4236/jcc.2014.24002
5,091
Downloads
7,913
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top