Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Face Recognition across Time Lapse Using Convolutional Neural Networks
(Articles)
Hachim El Khiyari
,
Harry Wechsler
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73010
5,917
Downloads
9,927
Views
Citations
An Investigative Study for Smart Home Security: Issues, Challenges and Countermeasures
(Articles)
Sudhir Chitnis
,
Neha Deshpande
,
Arvind Shaligram
Wireless Sensor Network
Vol.8 No.4
,April 25, 2016
DOI:
10.4236/wsn.2016.84006
13,054
Downloads
20,692
Views
Citations
The Role of Biodiversity in Food Security and Nutrition: A Potato Cultivar Case Study
(Articles)
Carmen van Niekerk
,
Hettie Schönfeldt
,
Nicolette Hall
,
Beulah Pretorius
Food and Nutrition Sciences
Vol.7 No.5
,April 28, 2016
DOI:
10.4236/fns.2016.75039
2,974
Downloads
6,666
Views
Citations
This article belongs to the Special Issue on
Food Analysis
Dual Authentication Hashing for Security Enhancement in MANET
(Articles)
L. Raja
,
Dr. P. S. Periasamy
Circuits and Systems
Vol.7 No.4
,April 28, 2016
DOI:
10.4236/cs.2016.74030
1,675
Downloads
2,643
Views
Citations
Farming-Biodiversity Segregation or Integration? Revisiting Land Sparing versus Land Sharing Debate
(Articles)
Fernando F. Goulart
,
Sonia Carvalho-Ribeiro
,
Britaldo Soares-Filho
Journal of Environmental Protection
Vol.7 No.7
,June 13, 2016
DOI:
10.4236/jep.2016.77090
3,655
Downloads
7,461
Views
Citations
This article belongs to the Special Issue on
Land Use Management and Sustainability
ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service
(Articles)
Y. Harold Robinson
,
S. Balaji
,
M. Rajaram
Circuits and Systems
Vol.7 No.8
,June 29, 2016
DOI:
10.4236/cs.2016.78175
1,836
Downloads
2,909
Views
Citations
Determinants of Students’ Observance of Library Regulations in Federal Polytechnic Nekede, Owerri, Imo State, Nigeria
(Articles)
Adaora J. Udo-Anyanwu
,
Matilda C. Oduagwu
,
Nkechi O. Okorie1
Open Access Library Journal
Vol.2 No.4
,April 16, 2015
DOI:
10.4236/oalib.1101353
1,181
Downloads
3,313
Views
Citations
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense
(Articles)
Ghazi Al Sukkar
,
Ramzi Saifan
,
Sufian Khwaldeh
,
Mahmoud Maqableh
,
Iyad Jafar
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83012
3,879
Downloads
9,763
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,558
Downloads
2,772
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,686
Downloads
6,763
Views
Citations
The Place of Africa in the International Community: Prospects and Obstacles
(Articles)
Adams Oloo
Open Access Library Journal
Vol.3 No.4
,April 20, 2016
DOI:
10.4236/oalib.1102549
18,363
Downloads
38,535
Views
Citations
Security Implementation in WSN with Symmetric and Matrix Mapping on Asymmetric ECC Cryptographic Techniques
(Articles)
S. Hemalatha
,
V. Rajamani
,
V. Parthasarathy
Circuits and Systems
Vol.7 No.10
,August 23, 2016
DOI:
10.4236/cs.2016.710273
2,138
Downloads
3,485
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,835
Downloads
2,736
Views
Citations
Potentials of the Groundnut Sector towards Achieving Food Security in Senegal
(Articles)
Ndiaye Georges
,
Shaoyong Fang
,
Mukete Beckline
,
Ye Wu
Open Access Library Journal
Vol.3 No.9
,September 5, 2016
DOI:
10.4236/oalib.1102991
2,518
Downloads
4,572
Views
Citations
Research on Financial Support Capacity of China’s Social Endowment Insurance by the Central and Local Governments—Analysis on the Statistic from 2009 to 2014
(Articles)
Tongbo Deng
Open Journal of Business and Management
Vol.4 No.4
,September 9, 2016
DOI:
10.4236/ojbm.2016.44067
2,069
Downloads
3,069
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,939
Downloads
3,421
Views
Citations
Strategic Agricultural Commodity Value Chains in Africa for Increased Food: The Regional Approach for Food Security
(Articles)
Mahamadou Nassirou Ba
Agricultural Sciences
Vol.7 No.9
,September 14, 2016
DOI:
10.4236/as.2016.79055
2,835
Downloads
6,242
Views
Citations
A Simple Security Proof for Entanglement-Based Quantum Key Distribution
(Articles)
Mhlambululi Mafu
Journal of Quantum Information Science
Vol.6 No.4
,December 21, 2016
DOI:
10.4236/jqis.2016.64018
2,112
Downloads
4,782
Views
Citations
Mental Health and Life Events of Overseas Children Left-Behind in China
(Articles)
Shengyu Zhao
,
Chuanjing Liao
Psychology
Vol.7 No.14
,December 27, 2016
DOI:
10.4236/psych.2016.714176
1,698
Downloads
3,713
Views
Citations
This article belongs to the Special Issue on
Child Psychology Research
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
(Articles)
Dognery Sinaly Silue
,
Wanggen Wan
,
Muhammad Rizwan
Open Journal of Applied Sciences
Vol.6 No.13
,December 28, 2016
DOI:
10.4236/ojapps.2016.613077
1,855
Downloads
3,113
Views
Citations
<
...
30
31
32
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top