Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Local Communities Demand for Food Tree Species and the Potentialities of Their Landscapes in Two Ecological Zones of Burkina Faso
(Articles)
Daniabla Natacha Edwige Thiombiano
,
Niéyidouba Lamien
,
Ana M. Castro-Euler
,
Barbara Vinceti
,
Dolores Agundez
,
Issaka Joseph Boussim
Open Journal of Forestry
Vol.3 No.3
,July 18, 2013
DOI:
10.4236/ojf.2013.33014
4,007
Downloads
6,495
Views
Citations
Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security
(Articles)
Kuljeet Kaur
,
Geetha Ganesan
Journal of Information Security
Vol.4 No.4
,September 5, 2013
DOI:
10.4236/jis.2013.44022
4,139
Downloads
6,606
Views
Citations
Critical Energy Infrastructure: Cyberterrorism Threats and Means of Protection
(Articles)
V. A. Vasenin
Journal of Software Engineering and Applications
Vol.6 No.9A
,September 25, 2013
DOI:
10.4236/jsea.2013.69A003
6,424
Downloads
8,545
Views
Citations
This article belongs to the Special Issue on
Software Engineering for Safety-Critical Systems and Medical Devices
The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength
(Articles)
Zhilong Xiong
,
Rui Zhang
,
Xin Zhan
,
Zhenglin Liu
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2079
2,858
Downloads
4,803
Views
Citations
A Secure Approach to Educating a Mobile World-Class Military —A Mobile Secure Concept for Accessing the Classroom from Around the World
(Articles)
Terry C. House
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2087
5,041
Downloads
6,329
Views
Citations
Research of Security Constrained Dispatching for Monthly Generation Plan
(Articles)
Rui Ge
,
Hai-chao Wang
,
Dun-nan Liu
Energy and Power Engineering
Vol.5 No.4B
,October 30, 2013
DOI:
10.4236/epe.2013.54B118
5,003
Downloads
6,023
Views
Citations
Communal Land Conflict and Food Security in Obudu Local Government Area of Cross River State, Nigeria
(Articles)
Francis Abul Uyang
,
Eucharia Nwabugo Nwagbara
,
Veronica Akwenabuaye Undelikwo
,
Rosemary Ine Eneji
Advances in Anthropology
Vol.3 No.4
,November 5, 2013
DOI:
10.4236/aa.2013.34027
6,609
Downloads
10,937
Views
Citations
Secure Communications for Two-Way Relay Networks Via Relay Chatting
(Articles)
Jun Xiong
,
Dongtang Ma
,
Chunguo Liu
,
Xin Wang
Communications and Network
Vol.5 No.3C
,November 7, 2013
DOI:
10.4236/cn.2013.53B2009
2,634
Downloads
4,205
Views
Citations
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
(Articles)
Xiao-min Ran
,
You-quan Mo
,
Yu-lei Chen
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2039
5,806
Downloads
7,133
Views
Citations
Influences of ±800 kV Yunnan-Guangdong HVDC System on Security and Stability of China Southern Power Grid
(Articles)
Baorong Zhou
,
Xiaoming Jin
,
Chao Hong
,
Pei Zhang
,
Zhigang Wu
Energy and Power Engineering
Vol.5 No.4B
,November 18, 2013
DOI:
10.4236/epe.2013.54B233
6,299
Downloads
7,926
Views
Citations
The likely impact of genetically modified soybeans in the Brazilian collective feeding service
(Articles)
Silvia Magalhães Couto
,
Gabriela Morgado de Oliveira Coelho
,
Marina de Figueiredo Ferreira
,
Victor Augustus Marin
,
Regina Serrão Lanzillotti
,
Haydée Serrão Lanzillotti
Agricultural Sciences
Vol.4 No.12
,December 25, 2013
DOI:
10.4236/as.2013.412098
5,367
Downloads
7,365
Views
Citations
Identity Authentication Based on Two-Beam Interference
(Articles)
Wenqi He
,
Xiang Peng
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24005
4,152
Downloads
5,562
Views
Citations
The SMS Chaum Mix
(Articles)
Matthew Rothmeyer
,
Dale R. Thompson
,
Matthew Moccaro
Journal of Computer and Communications
Vol.2 No.4
,March 18, 2014
DOI:
10.4236/jcc.2014.24010
5,263
Downloads
6,668
Views
Citations
Contribution of Vertical Farms to Increase the Overall Energy Efficiency of Urban Agglomerations
(Articles)
Podmirseg Daniel
Journal of Power and Energy Engineering
Vol.2 No.4
,April 16, 2014
DOI:
10.4236/jpee.2014.24013
9,135
Downloads
10,627
Views
Citations
New Proposed Robust, Scalable and Secure Network Cloud Computing Storage Architecture
(Articles)
Fawaz S. Al-Anzi
,
Ayed A. Salman
,
Noby K. Jacob
Journal of Software Engineering and Applications
Vol.7 No.5
,May 6, 2014
DOI:
10.4236/jsea.2014.75031
5,201
Downloads
7,336
Views
Citations
Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household
(Articles)
Xiangdong Hu
,
Hongru Xu
,
Kaimin Han
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27001
3,444
Downloads
4,688
Views
Citations
Scalable Trust-Based Secure WSNs
(Articles)
Amar Agrawal
,
Ruizhong Wei
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27003
3,770
Downloads
4,992
Views
Citations
Increased Fertility Rate Improves House Hold Utility, Despite Reducing the Wage Rate: The Burden of Long-Term Care Services
(Articles)
Masatoshi Jinno
Open Journal of Social Sciences
Vol.2 No.6
,June 4, 2014
DOI:
10.4236/jss.2014.26046
3,015
Downloads
4,302
Views
Citations
Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems
(Articles)
Stephen Brako Oti
,
James Ben Hayfron-Acquah
Journal of Computer and Communications
Vol.2 No.8
,June 17, 2014
DOI:
10.4236/jcc.2014.28002
4,360
Downloads
7,005
Views
Citations
Recharge to Blue Lake and Strategies for Water Security Planning, Mount Gambier, South Australia
(Articles)
Nara Somaratne
,
Jeff Lawson
,
Glyn Ashman
,
Kien Nguyen
Journal of Water Resource and Protection
Vol.6 No.8
,June 25, 2014
DOI:
10.4236/jwarp.2014.68073
3,703
Downloads
6,019
Views
Citations
<
...
21
22
23
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top