Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Semantically Sensitive Privacy Protection Method for Trajectory Publishing
(Articles)
Zhijian Shao
,
Bingwen Feng
,
Xingzheng Li
Journal of Computer and Communications
Vol.9 No.4
,April 16, 2021
DOI:
10.4236/jcc.2021.94003
426
Downloads
1,311
Views
Citations
Transparency in a Digitally Intertwined World: A Hybrid Approach to Consumers’ Protection
(Articles)
Lydia Montalbano
Open Journal of Social Sciences
Vol.9 No.8
,August 31, 2021
DOI:
10.4236/jss.2021.98031
459
Downloads
1,861
Views
Citations
Data Misuse, Data Theft and Data Protection in Nigeria: A Call for a More Robust and More Effective Legislation
(Articles)
Abiodun Odusote
Beijing Law Review
Vol.12 No.4
,December 29, 2021
DOI:
10.4236/blr.2021.124066
472
Downloads
4,344
Views
Citations
This article belongs to the Special Issue on
Legal Awareness and Legal Culture
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain
(Articles)
Zhiji Li
Journal of Information Security
Vol.13 No.2
,February 28, 2022
DOI:
10.4236/jis.2022.132003
730
Downloads
4,082
Views
Citations
Legal Principles, Difficulties and System Construction of Personal Financial Information Protection
(Articles)
Haoming Huang
Beijing Law Review
Vol.14 No.1
,March 7, 2023
DOI:
10.4236/blr.2023.141006
198
Downloads
737
Views
Citations
An Efficient and Anonymous Multidimensional Data Aggregation Scheme Based on Fog Computing for Smart Grids
(Articles)
Yu Chen
,
Jinmei Fan
,
Yanhai Zhang
Journal of Computer and Communications
Vol.13 No.3
,March 28, 2025
DOI:
10.4236/jcc.2025.133011
48
Downloads
220
Views
Citations
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
(Articles)
Anna Sheri George
,
Jomin George
,
Judy Jenkins
E-Health Telecommunication Systems and Networks
Vol.13 No.3
,August 9, 2024
DOI:
10.4236/etsn.2024.133003
145
Downloads
1,432
Views
Citations
Sustainable Tourism Using Security Cameras with Privacy Protecting Ability
(Articles)
V. Prashyanusorn
,
Y. Fujii
,
S. Kaviya
,
S. Mitatha
,
P. P. Yupapin
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12008
4,352
Downloads
9,697
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,261
Downloads
6,661
Views
Citations
Solving the Challenges of Pervasive Computing
(Articles)
Syed Muqsit Shaheed
,
Jalil Abbas
,
Asif Shabbir
,
Fayyaz Khalid
Journal of Computer and Communications
Vol.3 No.9
,September 15, 2015
DOI:
10.4236/jcc.2015.39005
8,662
Downloads
11,249
Views
Citations
Living Status/Shelter of Street Families of Kolkata: Prospects and Challenges
(Articles)
Harasankar Adhikari
Open Access Library Journal
Vol.1 No.6
,September 25, 2014
DOI:
10.4236/oalib.1100571
1,419
Downloads
2,458
Views
Citations
The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols
(Articles)
Zhicai Shi
,
Shitao Ren
,
Fei Wu
,
Changzhi Wang
Journal of Computer and Communications
Vol.4 No.8
,June 17, 2016
DOI:
10.4236/jcc.2016.48001
2,113
Downloads
3,275
Views
Citations
A Review of Gaps between Usability and Security/Privacy
(Articles)
Majed Alshamari
Int'l J. of Communications, Network and System Sciences
Vol.9 No.10
,October 25, 2016
DOI:
10.4236/ijcns.2016.910034
2,475
Downloads
7,068
Views
Citations
Internet of Things Behavioral-Economic Security Design, Actors & Cyber War
(Articles)
Robert L. Shuler
,
Billy G. Smith
Advances in Internet of Things
Vol.7 No.2
,April 30, 2017
DOI:
10.4236/ait.2017.72003
2,305
Downloads
4,276
Views
Citations
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger
(Articles)
Robert E. Endeley
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91008
11,449
Downloads
20,210
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
2,125
Downloads
6,224
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,824
Downloads
6,552
Views
Citations
Modeling Secure Home Area Network Based on IoT for Resource Constraints Environment
(Articles)
Minsu Park
,
Mwawi Kayuni
,
Tiwonge Manda
,
Hyunsung Kim
Journal of Computer and Communications
Vol.8 No.1
,January 10, 2020
DOI:
10.4236/jcc.2020.81004
761
Downloads
1,872
Views
Citations
Security and Privacy Concerns over IoT Devices Attacks in Smart Cities (2022)
(Articles)
Azizi Majid
Journal of Computer and Communications
Vol.11 No.1
,January 20, 2023
DOI:
10.4236/jcc.2023.111003
381
Downloads
3,208
Views
Citations
Ratings of Driving Factors for the Adoption and Implementation of Artificial Intelligence in the Public Sector
(Articles)
Samuel Narh Dorhetso
,
Bismark Dzahene Quarshie
Open Access Library Journal
Vol.10 No.5
,May 30, 2023
DOI:
10.4236/oalib.1109982
183
Downloads
1,341
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top