Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network
(Articles)
Ying Zheng
Communications and Network
Vol.3 No.4
,November 16, 2011
DOI:
10.4236/cn.2011.34026
6,046
Downloads
9,168
Views
Citations
Design and Development of a House-Mobile Security System
(Articles)
Ashraf Elfasakhany
,
Jorge Hernández
,
Juan Carlos García
,
Mario Reyes
,
Francisco Martell
Engineering
Vol.3 No.12
,December 14, 2011
DOI:
10.4236/eng.2011.312151
10,500
Downloads
16,960
Views
Citations
Evaluation of Electrocardiogram for Biometric Authentication
(Articles)
Yogendra Narain Singh
,
S K Singh
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31005
24,721
Downloads
36,270
Views
Citations
Combining Public Key Encryption with Schnorr Digital Signature
(Articles)
Laura Savu
Journal of Software Engineering and Applications
Vol.5 No.2
,February 27, 2012
DOI:
10.4236/jsea.2012.52016
9,467
Downloads
14,900
Views
Citations
Research and Analysis on Cognitive Radio Network Security
(Articles)
Long Tang
,
Juebo Wu
Wireless Sensor Network
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/wsn.2012.44017
9,069
Downloads
16,371
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
9,076
Downloads
14,190
Views
Citations
Evaluation of Operating Domains in Power Systems
(Articles)
M. A. El-Kady
,
Y. A. Alturki
,
M. S. Al-Saud
Energy and Power Engineering
Vol.4 No.4
,June 25, 2012
DOI:
10.4236/epe.2012.44037
4,762
Downloads
7,152
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
,August 31, 2012
DOI:
10.4236/cn.2012.43024
4,218
Downloads
7,468
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,609
Downloads
7,258
Views
Citations
Consumption Profile of the Socially Excluded People
(Articles)
Maniklal Adhikary
,
Khokon Sarkar
Modern Economy
Vol.3 No.6
,October 31, 2012
DOI:
10.4236/me.2012.36098
4,425
Downloads
6,663
Views
Citations
Water Quality in the Gaza Strip: The Present Scenario
(Articles)
Medhat Abbas
,
Maurizio Barbieri
,
Maria Battistel
,
Giuditta Brattini
,
Angelica Garone
,
Barbara Parisse
Journal of Water Resource and Protection
Vol.5 No.1
,January 25, 2013
DOI:
10.4236/jwarp.2013.51007
5,969
Downloads
10,008
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,250
Downloads
9,912
Views
Citations
A Formal Model of Conformity and Security Testing of Inheritance for Object Oriented Constraint Programming
(Articles)
Khalid Benlhachmi
,
Mohammed Benattou
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42013
4,497
Downloads
7,163
Views
Citations
Promoting sense of security in old-age care
(Articles)
Martina Boström
,
Marie Ernsth Bravell
,
Dan Lundgren
,
Anita Björklund
Health
Vol.5 No.6B
,June 17, 2013
DOI:
10.4236/health.2013.56A2009
8,152
Downloads
13,688
Views
Citations
This article belongs to the Special Issue on
Advances in Health Care and Rehabilitation Medicine
Local Communities Demand for Food Tree Species and the Potentialities of Their Landscapes in Two Ecological Zones of Burkina Faso
(Articles)
Daniabla Natacha Edwige Thiombiano
,
Niéyidouba Lamien
,
Ana M. Castro-Euler
,
Barbara Vinceti
,
Dolores Agundez
,
Issaka Joseph Boussim
Open Journal of Forestry
Vol.3 No.3
,July 18, 2013
DOI:
10.4236/ojf.2013.33014
4,007
Downloads
6,496
Views
Citations
Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security
(Articles)
Kuljeet Kaur
,
Geetha Ganesan
Journal of Information Security
Vol.4 No.4
,September 5, 2013
DOI:
10.4236/jis.2013.44022
4,139
Downloads
6,606
Views
Citations
The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength
(Articles)
Zhilong Xiong
,
Rui Zhang
,
Xin Zhan
,
Zhenglin Liu
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2079
2,858
Downloads
4,803
Views
Citations
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World
(Articles)
Terry C. House
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2087
5,041
Downloads
6,329
Views
Citations
Research of Security Constrained Dispatching for Monthly Generation Plan
(Articles)
Rui Ge
,
Hai-chao Wang
,
Dun-nan Liu
Energy and Power Engineering
Vol.5 No.4B
,October 30, 2013
DOI:
10.4236/epe.2013.54B118
5,003
Downloads
6,023
Views
Citations
Communal Land Conflict and Food Security in Obudu Local Government Area of Cross River State, Nigeria
(Articles)
Francis Abul Uyang
,
Eucharia Nwabugo Nwagbara
,
Veronica Akwenabuaye Undelikwo
,
Rosemary Ine Eneji
Advances in Anthropology
Vol.3 No.4
,November 5, 2013
DOI:
10.4236/aa.2013.34027
6,609
Downloads
10,937
Views
Citations
<
...
17
18
19
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top